Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-4609 PoC — TCP/IP Protocol 堆栈不确定的远程拒绝服务漏洞

Source
Associated Vulnerability
Title:TCP/IP Protocol 堆栈不确定的远程拒绝服务漏洞 (CVE-2008-4609)
Description:The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
Description
Sockstress (CVE-2008-4609)  DDoS implementation written in Go
Readme
# sockstress
Sockstress (CVE-2008-4609)  implementation using Go

## Install
```
go get github.com/marcelki/sockstress
```

## Usage
```
Usage: sockstress [options...] <ip-address>

Options:
  -p    The destination port to attack.
  -i    The network interface to use.
  -d    The delay between SYN packets
        You can choose your unit of time (e.g. 1ns, 0.001s)
  -h    Display this help.
```
File Snapshot

[4.0K] /data/pocs/ca416fac526d5100bacdd6a6f0f22506e49c1fd8 ├── [ 11K] LICENSE ├── [5.7K] main.go ├── [ 398] README.md └── [4.0K] tcp └── [3.3K] main.go 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →