Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/dos/http/metasploit_httphandler_dos.md
Views: 11789
Vulnerable Application
Metasploit Framework before version 5.0.28
Verification Steps
Install Metasploit 5.0.27 or earlier (or checkout before commit 5621d200ccf62e4a8f0dad80c1c74f4e0e52d86b)
Start msfconsole with the target Metasploit instance and start any reverse_http/reverse_https listener
Start this module and set RHOSTS and RPORT to the target listener address and port.
Run the modulest [removed]```
msfconsole
should use 99%+ CPU for a varying amount of time depending on the DOSTYPE option. You may need to kill the process manually.
Options
DOSTYPE