Download url : http://jayakonstruksi.com/backupintsec/rapache.tgz
bug found by : Nikolaus Rango (Kingcope)
sploit coded by : ev1lut10n
evllut10n's email : ev1lut10n_exploit@yahoo.com
ev1lut10n's gopher : gopher://sdf.org/1/users/ev1lut10
thanks to: X-hack, Danzel, superman,flyff666,peneter,wenkhairu, fadli,gunslinger,petimati,net_spy, and all my friends and you !
=================
root@ev1l:/home/ev1lut10n# ./rapache
Remote Apache Denial of Service Exploit by ev1lut10n
[-] Usage : ./rapache hostname
root@ev1l:/home/ev1lut10n#
===================
===========
affected:
Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19
==============
J2TEAM Security: A must-have extension for Chrome users.
Install now!
My name is Manh Tuan. I'm the leader of J2TEAM, the team behind J2TEAM Security, J2TEAM Cookies, Death Click and J2TEAM Community.