generic_send_tcp 192.168.77.146 21 /usr/share/spike/audits/FTPD/ftpd1.spk 0 0 s_string_variable(“admin”); s_string(“\r\n”); s_string_variable(“anonymous”); s_string(“\r\n”); s_string(“PASS “); s_string_variable(“anonymous”); s_string(“\r\n”); s_string(“SITE “); s_string_variable(“SEDV”); s_string(“\r\n”); s_string(“ACCT “); s_string_variable(“bob”); s_string(“\r\n”); s_string(“CWD “); s_string_variable(“.”); s_string(“\r\n”); s_string(“SMNT “); s_string_variable(“.”); s_string(“\r\n”); s_string(“PORT “); s_string_variable(“1”); s_string(“,”); s_string_variable(“2”); s_string(“,”); s_string_variable(“3”); s_string(“,”); s_string_variable(“4”); s_string(“,”); s_string_variable(“5”); s_string(“,”); s_string_variable(“6”); s_string(“\r\n”); s_string(“TYPE “); s_string_variable(“I”); s_string(“\r\n”); s_string(“STRU “); s_string_variable(“P”); s_string(“\r\n”); s_string(“MODE “); s_string_variable(“C”); […]
-
Recent Posts
- JSON ContentTypeHandler
- Mac OS X vulnerability – execution of arbitrary Javascript code without restrictions
- Snort rules for Petya ransomware
- HIDDEN COBRA – DDoS Botnet Infrastructure
- Unauthenticated buffer overflow exploit
- Python – exploit script
- Bind mounts
- Autodafé
- Sulley request designed to fuzz a Web server
- General Purpose Fuzzer (GPF)
Tags
Contact
rniko@cryptolab.net
License