Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-1999-0016 PoC — 多家厂商TCP/IP实现处理相同源、目标IP数据包失败拒绝服务攻击漏洞

Source
Associated Vulnerability
Title:多家厂商TCP/IP实现处理相同源、目标IP数据包失败拒绝服务攻击漏洞 (CVE-1999-0016)
Description:TCP/IP网络协议栈是大多数操作系统均实现的用于Internet联网的最被广为使用的网络协议。 早期BSD派生系统(Linux除外)及Windows系统TCP/IP协议栈实现上存在漏洞,远程攻击者可以利用此漏洞对服务器进行拒绝服务攻击。 发送一个源地址和目标地址相同,源端口和目的端口也相同的SYN包到有漏洞的目标系统,这就是著名的Land攻击。由于TCP/IP实现上的问题,目标系统对此种畸形包的处理可能会出问题。不同的系统对Land攻击反应不同,许多老版本的UNIX类操作系统将崩溃,NT的CPU资源占用
Description
A simple dos-tool 
Readme
# CVE-1999-0016-Land-DOS-tool

## DISCLAIMER: This tool is for educational purposes only. 

This tool can be used to check if a target has the CVE-1999-0016 vulnerability.
The tool is zero effort, so it is not pretty nor does it handle any potential errors. But it works as a zero effort POC.  

Requires the library Scapy.
File Snapshot

[4.0K] /data/pocs/290c133ee43a71a0e39959744d162b7fdd960636 ├── [1.8K] dostool.py ├── [ 324] README.md └── [4.0K] scapy 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.