This exploit demonstrates a denial-of-service (DoS) vulnerability in FileFuzz by manipulating the application's file fuzzing configuration to crash ntbackup.exe. The PoC involves setting specific parameters in the FileFuzz GUI to trigger the crash.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:FileFuzz (IDefense Labs)
No auth needed
Prerequisites:FileFuzz installed · ntbackup.exe present on the system