Penetration Testing mailing list archives

Re: FTP Exploit?


From: "C. Hamby" <fixer () gci net>
Date: Mon, 26 Jun 2006 18:15:55 -0800

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

No guarantees, but try this:

http://downloads.securityfocus.com/vulnerabilities/exploits/ws_ftp2.0.3.pl

The vulns are pretty similar, though not identical so you may need to
tweak the script a bit.

- -cdh



09Sparky () gmail com wrote:
Does anyone know of a good way/tool/script (aside from Core) to test this FTP DOS? I can only find and exploit from 
CORE and I don't have access to that.

Thanks,

09Sparky


(Results from Nessus)


It may be possible to make the remote FTP server crash

by sending the command 'STAT *?AAA...AAA.


An attacker may use this flaw to prevent your site from distributing files


*** Warning : we could not verify this vulnerability.
*** Nessus solely relied on the banner of this server


Risk factor : Medium

CVE : CVE-2002-0073

BID : 4482

Other references : IAVA:2002-A-0002

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEVAwUBRKCU2wt0Y4479LtgAQKkTAf/VVcRZ4ux8dYU5qQUqpXC0qGv9Z0Y4h5s
xdxK1ThbjRB4oECHwcYguZGcUIIiTMP+eDHK5sIEU1DWzT93s2ZDB8s6VzFh72DL
jaIN8gtZLpEyVA2txxeRS+fHnl2UjLWCJD6D01MyVm+VdcJ6p/6eHWhQSxVdTF7J
VCbdOs3kNZG0p1ByrVfcG3IctfGYQharGaO4N8iMB9v9gn6IKmOdk0JnjlsOAsAG
QTztWQi4D84y+rzwsnZRWxftL5Or5l1i3TNCQQZDtdoZ8F8ucuSw2S9sv9IKDphr
4SAsAxEaO4OJKrYV6I7cFPqdQhixFaiR//X/fdajUyrxnpl3++QFig==
=b0jC
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: