![]() |
ex·ploit\'ek-sploit,'ik-\
1 a: to put to productive use
|
FTP Exploits: they take advantage of weaknesses in FTP protocols and programs (ie. wu-ftpd)...Just FYI, the Root? column is to identify whether or not it is necessary to have root privileges in order to execute the exploit. The other columns should be self explanatory...if you have any questions or find any errors, feel free to drop an email my way. Other than that, take it easy gang...
Regards, |
FILE NAME |
SIZE |
EXPLOIT |
ROOT? |
|
![]() |
ftpbug.c |
(2k) |
wu-ftp 2.x exploit (site exec bug) |
|
![]() |
ftp-scan.c |
(3k) |
Allows a user to connect to an arbritary IP address and port |
|
![]() |
ftp-1.txt |
(3k) |
Possibility to create a login account via anonymous FTP |
|
![]() |
ftpd1.txt |
(1k) |
Possibility to gain access to a system via .rhosts |
|
![]() |
ftpd2.txt |
(11k) |
FTP server bounce attack - various outcomes possible |
|
![]() |
ftpd3.txt |
(1k) |
View shadowed passwd file on Solaris systems |
|
![]() |
ftpshadow.txt |
(4k) |
Potential to view etc/passwd and etc/shadow files |
|
![]() |
ftptftp.txt |
(3k) |
Retrieve and overwrite files remotely without authentication |
|
![]() |
wuftp24.c |
(1k) |
wu-ftp(1) 2.4 exploit to obtain a root shell |
|
![]() |
wuftpd1.txt |
(5k) |
Gain root access from any account on the system |
|
![]() |
wuftpd2.txt |
(1k) |
wu-ftpd v2.2 and v2.1f may contain a trojan horse |
|
![]() |
wuftpd3.txt |
(3k) |
Root privileges possible via 'site exec' bug |
|
![]() |
wuftpd-overwrite.txt |
(1k) |
Exploit allows the creation of a file anywhere on a system |
|
![]() |
wu-ftpd.bug |
(6k) |
May allow access to files as uid 0 (root) |
|
Copyright © 1995-1997 Silicon Toad
Thou Shalt Not Copy
silicon@netwalk.com
Latest Revision: 01.Apr.1997
_________.___.____ .____________ ________ _______ / _____/| | | | \_ ___ \ \ \ \ \ \_____ \ | | | | / \ \/ | | \ / | \ / \| | |___| \ \____| | \/ | \ / _____ /|___|________|___|\________/\_________/\ __|__ / | / \/ [ T O A D ] \/ \ | |( )| (' ') |