Penetration Testing mailing list archives
Re: FTP Exploit?
From: "C. Hamby" <fixer () gci net>
Date: Mon, 26 Jun 2006 18:15:55 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 No guarantees, but try this: http://downloads.securityfocus.com/vulnerabilities/exploits/ws_ftp2.0.3.pl The vulns are pretty similar, though not identical so you may need to tweak the script a bit. - -cdh 09Sparky () gmail com wrote:
Does anyone know of a good way/tool/script (aside from Core) to test this FTP DOS? I can only find and exploit from CORE and I don't have access to that. Thanks, 09Sparky (Results from Nessus) It may be possible to make the remote FTP server crash by sending the command 'STAT *?AAA...AAA. An attacker may use this flaw to prevent your site from distributing files *** Warning : we could not verify this vulnerability. *** Nessus solely relied on the banner of this server Risk factor : Medium CVE : CVE-2002-0073 BID : 4482 Other references : IAVA:2002-A-0002 ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQEVAwUBRKCU2wt0Y4479LtgAQKkTAf/VVcRZ4ux8dYU5qQUqpXC0qGv9Z0Y4h5s xdxK1ThbjRB4oECHwcYguZGcUIIiTMP+eDHK5sIEU1DWzT93s2ZDB8s6VzFh72DL jaIN8gtZLpEyVA2txxeRS+fHnl2UjLWCJD6D01MyVm+VdcJ6p/6eHWhQSxVdTF7J VCbdOs3kNZG0p1ByrVfcG3IctfGYQharGaO4N8iMB9v9gn6IKmOdk0JnjlsOAsAG QTztWQi4D84y+rzwsnZRWxftL5Or5l1i3TNCQQZDtdoZ8F8ucuSw2S9sv9IKDphr 4SAsAxEaO4OJKrYV6I7cFPqdQhixFaiR//X/fdajUyrxnpl3++QFig== =b0jC -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- FTP Exploit? 09Sparky (Jun 26)
- Re: FTP Exploit? C. Hamby (Jun 26)
- Re: FTP Exploit? Satanic.Brain (Jun 26)
- Re: FTP Exploit? H D Moore (Jun 27)