This commit is contained in:
6arelyFuture 2021-05-11 10:04:48 +02:00
parent 5d55f10177
commit 6214086c94
Signed by: Future
GPG Key ID: FA77F074E98D98A5
2 changed files with 11 additions and 11 deletions

View File

@ -24,4 +24,4 @@ The exploit works by modifying the server name with a malicious string of charac
| Argument | Description | | Argument | Description |
|:----------------------------|:-----------------------------------------------| |:----------------------------|:-----------------------------------------------|
| `--dev-build` | Do nothing. | | `--dev-build` | Do nothing. |
| `--copy-to` | Copy the EXE to a custom folder after build. | | `--copy-to` | Copy the EXE to a custom folder after build. |

View File

@ -18,10 +18,10 @@ bool startUp()
sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if (INVALID_SOCKET == sock) if (INVALID_SOCKET == sock)
{ {
printf("Can't initialize socket\n"); printf("Can't initialize socket\n");
return false; return false;
} }
sockaddr_in service{}; sockaddr_in service{};
service.sin_family = AF_INET; service.sin_family = AF_INET;
@ -68,9 +68,9 @@ DWORD WINAPI recvTh(LPVOID)
auto len = recvfrom(sock, buf.get(), BUF_SIZE, 0, (SOCKADDR*)&sender, &senderSize); auto len = recvfrom(sock, buf.get(), BUF_SIZE, 0, (SOCKADDR*)&sender, &senderSize);
if (len == SOCKET_ERROR) if (len == SOCKET_ERROR)
{ {
return 1; return 1;
} }
if (len == sizeof(serverQuery_t)) if (len == sizeof(serverQuery_t))
{ {
@ -95,9 +95,9 @@ DWORD WINAPI recvTh(LPVOID)
int main(int, char**) int main(int, char**)
{ {
if (!startUp()) if (!startUp())
{ {
return 1; return 1;
} }
DWORD dwThreadId; DWORD dwThreadId;
auto thread = CreateThread(0, 0, recvTh, 0, 0, &dwThreadId); auto thread = CreateThread(0, 0, recvTh, 0, 0, &dwThreadId);