This exploit sends a large buffer of 'A' characters to the haneWIN DNS Server on port 53, causing a denial of service. The code is a simple proof-of-concept for a buffer overflow vulnerability.
Classification
Working Poc 90%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:haneWIN DNS Server 1.5.3
No auth needed
Prerequisites:Network access to the target DNS server