root@linux:~# more /root/.msf4/modules/exploits/windows/ftp/FreeFloatMKDoverflow.rb require ‘msf/core’ class MetasploitModule < Msf::Exploit::Remote include Msf::Exploit::Remote::Ftp def initialize(info = {}) super(update_info(info, ‘Name’ => ‘FloatFTP MKD overflow’, ‘Description’ => ‘MSF exploit module’, ‘Author’ => [ ‘Name Surname’], ‘Version’ => ‘$Revision: 1 $’, ‘Platform’ => [‘win’], ‘Targets’ => [ [ ‘Windows 7 Professional x64 SP1’, { } ],], ‘DefaultTarget’ => 0, ‘License’ […]
-
Recent Posts
- JSON ContentTypeHandler
- Mac OS X vulnerability – execution of arbitrary Javascript code without restrictions
- Snort rules for Petya ransomware
- HIDDEN COBRA – DDoS Botnet Infrastructure
- Unauthenticated buffer overflow exploit
- Python – exploit script
- Bind mounts
- Autodafé
- Sulley request designed to fuzz a Web server
- General Purpose Fuzzer (GPF)
Tags
Contact
rniko@cryptolab.net
License