Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-5211 PoC — NTP monlist功能输入验证错误漏洞

Source
Associated Vulnerability
Title:NTP monlist功能输入验证错误漏洞 (CVE-2013-5211)
Description:The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
Description
Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.
Readme
ntpscanner
==========

Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.
File Snapshot

[4.0K] /data/pocs/2dd30dbbd968487c58357aef23757b8d957be012 ├── [ 18K] LICENSE ├── [2.0K] ntpscanner.py └── [ 97] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →