Share
## https://sploitus.com/exploit?id=F2C31EC7-673E-5762-8DE8-DE66EB45F05B
## Overview

This project is a  Python script designed to identify and exploit vulnerable Windows systems using Shodan for reconnaissance and Scapy for crafting and sending malicious IPv6 packets targeting **CVE-2024-38063**. The tool automates the process of searching for vulnerable hosts, verifying their susceptibility, and executing a Denial of Service (DoS) attack to induce a Blue Screen of Death (BSOD).

## CVE-2024-38063 Explained

**CVE-2024-38063** is a critical vulnerability identified in certain versions of the Windows operating system. The vulnerability arises from improper handling of IPv6 Neighbor Discovery (ND) packets, specifically in the processing of fragmented IPv6 packets. An attacker can exploit this flaw by sending specially crafted IPv6 packets that cause the Windows system to crash, resulting in a Blue Screen of Death (BSOD).

### Why the Vulnerability Occurred

- **Improper Fragment Reassembly:** The Windows kernel fails to correctly reassemble fragmented IPv6 packets under specific conditions, leading to memory corruption.
- **Lack of Boundary Checks:** Insufficient validation of packet boundaries allows maliciously crafted packets to overwrite critical memory regions.
- **Race Conditions:** Timing discrepancies during packet processing can be exploited to trigger the vulnerability reliably.

## Installation

1. **Clone the Repository:**
git clone https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner


2. **Install Dependencies:**
pip install -r requirements.txt


## Usage

Run the script with the necessary arguments:

```bash
python exploit.py --api-key YOUR_SHODAN_API_KEY --os "Windows 10" --max-version "10.0.26100" --pages 2 --batches 20 --corruptions 20
```
### Arguments

- `--api-key`: Shodan API Key (optional if set as environment variable).
- `--os`: Target OS name (default: "Windows 10").
- `--max-version`: Maximum OS version to target (default: "10.0.26100").
- `--pages`: Number of Shodan pages to search (default: 2).
- `--batches`: Number of packet batches to send (default: 20).
- `--corruptions`: Number of corruptions per batch (default: 20).

### Disclaimer

Use this tool responsibly and only on systems you have explicit permission to test. Unauthorized use is illegal and unethical. The authors are not liable for any misuse of this tool.

### License

This project is licensed under the [MIT License](LICENSE).