Showing posts sorted by relevance for query killapache. Sort by date Show all posts
Showing posts sorted by relevance for query killapache. Sort by date Show all posts

killapache (DDOS Tool For Apache Web Server)

A unknown flaw in the code for processing byte range headers allows versions 2.2.x of the Apache Web Server to be crippled from a single PC. A suitable “Apache Killer” Perl script that impressively demonstrates the problem. This has been assigned CVE-2011-3192 as its CVE identifier.

How killapache Works:-

killapache sends GET requests with multiple “byte ranges” that will claim large portions of the system’s memory space. A “byte range” statement allows a browser to only load certain parts of a document, for example bytes 500 to 1000. It is normally used while downloading large files. This method is used by programs such as download clients to resume downloads that have been interrupted; it is designed to reduce bandwidth requirements. However, it appears that stating multiple unsorted components in the header can cause an Apache server to malfunction.

To download the Killapache Perl file Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

killapache Modified Exploit (DDOS Tool For Apache Web Server)


Earlier we have talked about killapache (DDOS Tool For Apache Web Server) it was coded by kingscope’s , re-edited and coded by “S4(uR4″ , which kills apache and still many websites are vulnerable.

Difference Between Old and New Modified Exploit:-
40c40
< $p = “HEAD / HTTP/1.1rnHost: $ARGV[0]rnRange:bytes=0-$prnAccept-Encoding: gziprnConnection: closernrn”; — > $p = “HEAD “.($ARGV[2] ? $ARGV[2] : “/”).”HTTP/1.1rnHost: $ARGV[0]rnRange:bytes=0-$prnAccept-Encoding: gziprnConnection: closernrn”;

56c56
< $p = “HEAD / HTTP/1.1rnHost: $ARGV[0]rnRange:bytes=0-$prnAccept-Encoding: gziprnConnection: closernrn”; — > $p = “HEAD “.($ARGV[2] ? $ARGV[2] : “/”) .” HTTP/1.1rnHost: $ARGV[0]rnRange:bytes=0-$prnAccept-Encoding: gziprnConnection: closernrn”;

73c73
< if ($#ARGV > 1) {
> if ($#ARGV > 0) {

How the code works:-
killapache sends GET requests with multiple “byte ranges” that will claim large portions of the system’s memory space. A “byte range” statement allows a browser to only load certain parts of a document, for example bytes 500 to 1000. It is normally used while downloading large files. This method is used by programs such as download clients to resume downloads that have been interrupted; it is designed to reduce bandwidth requirements. However, it appears that stating multiple unsorted components in the header can cause an Apache server to malfunction.
There is no patch yet released for this vulnerability on apache, but a few work arounds have been found we have also discussed about it in our previous post. These have been posted by The Apache Software Foundation and can be used until a stable fix is released.The vulnerability works by exploiting a feature in web servers that gives you the ability to pause and resume your downloads. These days if you have to stop downloading something part-way through you can generally pick up where you left off and you don’t have to start again from scratch.

To Download the new version Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DDoS Tool For Apache Server 2.3.14

After killapache success yet another POC on apache for DDOS tools. Apache Server 2.3.14 Denial of Service (DDOS) Vulnerability exploit. Latest version of Apache Server 2.3.14 fails. The Egyptian Hacker and Exploit writer “Xen0n” discovered this Vulnerability and Develop an perl exploit for (DDOS) Vulnerability. The script is written in perl can be easily modified.

To Download POC Apache Server 2.3.14 Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

KillApachePy [Python version of Apache Killer]


Previously we have talked about the KillApache, the DDoS exploit which can kill the vulnerable Apache web server by performing massive denial of service of attack. Recently, Miroslav Štampar one of the co-authors of the awesome sqlmap tool programmed a Python variant of the same attack with a few more options and called it KillApachePy.
KillApachePy is a Python version of the tool, which aims to be more user friendly and has few program workflow enhancements, like automatic usage of maximum (system) allowed thread number, setting custom HTTP method (GET/HEAD/…), custom target page for retrieval, proxy support, etc. As it always has been with his code, it is small, efficient and highly optimized.

For More Information & to Download The Source Code Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...