Skip to content

7etsuo/deepfreeze-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

deepfreeze-exploit

This repository contains an exploit for Faronics DeepFreeze 8.38.220.5256. It leverages a discovered vulnerability to overwrite the SEH handler and execute a custom WriteProcessMemory-based ROP chain. The payload includes a hand-crafted reverse-shell shellcode that, once injected, establishes a reverse connection back to the attacker.

Features

  • SEH overflow to gain control of execution flow
  • Custom ROP chain using WriteProcessMemory
  • Hand-crafted reverse-shell shellcode placed in process memory
  • Two-phase encryption bypass (checksum-based obfuscation followed by random XOR-based encryption) to overcome server-side encryption

Requirements

  • Python 3
  • keystone-engine
  • capstone
  • rich
  • numpy

Installation

pip install keystone-engine capstone rich numpy
python snowcra5h_deepfreeze_exploit.py

Edit the REVSHELL_IP and REVSHELL_PORT variables in the script before running to configure the reverse shell connection details.

Notes

  • Ensure that the target host and port are set in TARGET_IP and TARGET_PORT.
  • The exploit sends the payload over TCP. Confirm that the target is running the vulnerable service and listening on the specified port.

About

An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve remote code execution with a reverse shell.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages