By sending a specially crafted SMB packet, this exploit performs a Denial of Service attack on the target machine. The attack will trigger an operating system halt (Blue Screen).
A buffer overflow vulnerability exists in Microsoft's PPTP (Point to Point Tunnelling Protocol) implementation. Both the PPTP server and client applications are vulnerable. It is possible to crash the kernel of the target (blue screen), the installation of an agent using this vulnerability is difficult and have not been implemented in this module.
This module sends HTTP requests with specially crafted data making the PHP process consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational. The PATH parameter must point to a PHP web page, which they normally have a ".php" extension.
This module exploits a null pointer vulnerability in the OpenLDAP service when parsing a malformed requests. The vulnerability is exploited remotely by sending a specially crafted packet to write an existing value with an empty one. The service will be automatically restarted after 1-2 minutes. To keep the service down set KEEP_TRYING parameter true