Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-4609 PoC — TCP/IP Protocol 堆栈不确定的远程拒绝服务漏洞

Source
Associated Vulnerability
Title:TCP/IP Protocol 堆栈不确定的远程拒绝服务漏洞 (CVE-2008-4609)
Description:Linux, 建立在BSD Unix基础上的平台,Microsoft Windows,Cisco产品,以及其他可能的操作系统中的TCP执行程序,允许远程攻击者通过多个可以操纵TCP状态表中的信息的向量来引起拒绝服务 (队列拥塞)。
Description
Sockstress (CVE-2008-4609)  DDoS implementation written in Go
Readme
# sockstress
Sockstress (CVE-2008-4609)  implementation using Go

## Install
```
go get github.com/marcelki/sockstress
```

## Usage
```
Usage: sockstress [options...] <ip-address>

Options:
  -p    The destination port to attack.
  -i    The network interface to use.
  -d    The delay between SYN packets
        You can choose your unit of time (e.g. 1ns, 0.001s)
  -h    Display this help.
```
File Snapshot

[4.0K] /data/pocs/ca416fac526d5100bacdd6a6f0f22506e49c1fd8 ├── [ 11K] LICENSE ├── [5.7K] main.go ├── [ 398] README.md └── [4.0K] tcp └── [3.3K] main.go 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.