This Python script exploits a Denial of Service (DoS) vulnerability in Novell eDirectory by sending an oversized HTTP HEAD request with a malformed 'Host' header. The payload consists of a large string of '<' characters, which triggers a crash or resource exhaustion in the target service.
Classification
Working Poc 95%
Attack Type
Dos
Complexity
Trivial
Reliability
Reliable
Target:Novell eDirectory (version unspecified)
No auth needed
Prerequisites:Network access to the target service on port 8028