我正在尝试利用Cisco ASA设备(具有这样做的权限)。漏洞利用似乎可以部分运行,但是我收到一个套接字错误。为什么会这样呢?
我的CLI参数指向有效的侦听端口和有效的目标公用IP。
您可以在此处找到Python漏洞(CVE-2016-1287):https://pastebin.com/iGtSDxgL
运行漏洞利用程序后,我收到以下消息:
[+] Using session ID: 0EJY8LLA
[+] Cookie: ��ԏ��
[+] New SA successfuly created.
[+] Using session ID: 6LJ8J6D1
[+] Cookie: ��J�e;u
[+] New SA successfuly created.
Traceback (most recent call last):
File "poc.py", line 476, in <module>
exploit.interact()
File "poc.py", line 266, in interact
s.bind((self._revHost, self._revPort))
File "/usr/lib/python2.7/socket.py", line 224, in meth
return getattr(self._sock,name)(*args)
socket.error: [Errno 99] Cannot assign requested address