exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hack_wsftp.txt

hack_wsftp.txt
Posted Aug 17, 1999
Authored by Netherpunk

ws_ftp security design weaknesses allow malicious cracker to take advantage of cached passwords with weak encryption. Remote root compromise possible.

tags | exploit, remote, root
SHA-256 | 238edab4bc6e5f142419ec5e1ddc1910ecc64838274acce9252d7a9f1ce2ce6b

hack_wsftp.txt

Change Mirror Download
Hacking WS FTP.INI
------------------


```````````````````````````````````````````````````````````
` ``````````````````````````````````````````````````````` `
` ` ` `
` ` ` `
` ` ` `
` ` ` `
` ` ` `
` ` * ***** *********** ` `
` ` * * * * * ` `
` ` * * * * * ` `
` ` ******* ***** * ` `
` ` * * * * * ` `
` ` * * * * * ` `
` ` * * * * * * *********** * ` `
` ` ` `
` ` http://4n4rchy.hypermart.net ` `
` ` ` `
` ` ` `
` ` ` `
` ` ` `
` ``````````````````````````````````````````````````````` `
```````````````````````````````````````````````````````````
by, Netherpunk, Anarchist Rampage Inc.



I pretty much stumbled onto this bug by myself. Others have probably found it before me, so
I'll let you decide. I actually rewted a few web servers with this thing, so it can be pretty
usefull if you know what you are looking for.

First, most everything that has password options in windows gives you the option to save your
password, usually by checking a check box labeled "save password". Now, being a windows expert
myself, I could say that windows or the program will cache this password in some file very
lightly encrypted. Now this is not only stupid, but it is also a security risk if your
computer is accessable over any network. Never ever save your passwords anywhere. Memorise
them in your head. And also never use the same password for everything.

Now that we know Ws Ftp has the "save password" option, you will want to know where the password
is located. You guessed by the title of the text didn't you? WS_FTP.INI is the file that
stores the ftp sessions that are both default and user defined in Ws Ftp. Now when you open
WS_FTP.INI, you will find normail default settings. Here is an example of the default session to
winsite.com.

[WinSite]
HOST=ftp.winsite.com
UID=anonymous
[Smithsonian Images]
HOST=photo1.si.edu
UID=anonymous
DIR="/images/gif89a/"

Now let us view an example of an ftp session to a sample host with a cached password.

[Primehost]
HOST=sampleftp.host.com
UID=admin
PWD=VE0496D09AC505584A460E9F9B1ABCD9F79A4AB9E9B
PASVMODE=1
TIMEOFFSET=0
LOCDIR=\
rdir0="/"
rdir1="/Backups"
rdir2="/Website"
rdir3="/Website/Common"
ldir0=C:\

Notice the encypted password? Thats what we want to see.

Now that you know what you are looking for, where do you get it and what do you do with it.
Well, as for finding WS_FTP.INI, that is up to you. Some morons upload every file including
WS_FTP.INI to their site. You can also try computers in cyber cafes as well. Now, some might
do things the hard way and try to decrypt the password in some *nix platform. There are c
scripts that do this for .INI files. But what if you are on windows? Get Ws Ftp first of all.
Than copy the session from the victim's .INI and paste it in your own .INI file. Then open
Ws Ftp and connect. That's pretty simple, far to easy for most. Have fun.

This is a big security risk due simply to Ipswitch's lack of effort as far as security is
concerned. Ws Ftp or any FTP program for that matter, can be a big security risk for those who
aren't conscious about it. The bottom line is, never save your passwords. Cached password
files use weak encryption, and in some cases like that of WS_FTP.INI, anyone can use the cached
FTP session.

Happy Hacking!
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close