Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-0785 PoC — Android Service Discovery Protocol服务器信息泄露漏洞

Source
Associated Vulnerability
Title:Android Service Discovery Protocol服务器信息泄露漏洞 (CVE-2017-0785)
Description:A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698.
Description
Scan/Exploit Blueborne  CVE-2017-0785
Readme
# Blueborne CVE-2017-0785

This CVE and all the other BlueBorne CVEs are explained here: https://www.armis.com/blueborne/

This project was a proof of concept for a talk I gave in 2017. 

It simply performs a scan, prints out probably vulnerable hosts based on MACs and then runs the exploit on the target of your selection (if the device is actually vulnerable you will see a hex printout, if you run the exploit against a patched system nothing will return).

## Usage: 

`python bluebornescan.py`

## References:

https://github.com/hook-s3c/blueborne-scanner

https://github.com/ojasookert/CVE-2017-0785


Pulled code from these two repos, polished it up a bit, and ported to python 3.

File Snapshot

[4.0K] /data/pocs/32caa45cd7ba43ee189a91a1ae78d184057cd2a0 ├── [1.5K] bluebornescan.py ├── [1.5K] cve20170785.py ├── [1.0K] LICENSE ├── [6.8K] notes.txt ├── [ 691] README.md └── [ 24K] vulndevices.py 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →