LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 10-27-2005, 03:42 PM   #1
RIB-EYE
LQ Newbie
 
Registered: May 2005
Posts: 10

Rep: Reputation: 0
Pentesting with an exploit


\
Ok, I know I am probally going to catch some Sh** here but here it goes.

I have a slackware box and I am playing around with pentesting on my OWN network. One of my co-workers asked me to test some of his servers from the outside and see if I can get in. This is all approved and legal. No bullsh**. I found a server that is running proftp that has a known exploit. I would like to see if I can use this. I found the code and saved it to a text file. The exploit is...

proftpd < 1.2.10 remote user enumeration


The remote ProFTPd server is as old or older than 1.2.10

It is possible to determine which user names are valid on the remote host
based on timing analysis attack of the login procedure.

An attacker may use this flaw to set up a list of valid usernames for a
more efficient brute-force attack against the remote host.

Solution : Upgrade to a newer version
Risk factor : Low
CVE_ID : CAN-2004-1602
BUGTRAQ_ID : 11430
NESSUS_ID : 15484

How do I take this code and use it? I have in txt, how do you compile it and use it? I have searched all over Google and only found info that the exploit exists, thats it. I am new to Linux but starting to feel comfortable using it now.

Thanks
 
Old 10-27-2005, 04:24 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Ok, I know I am probally going to catch some Sh** here but here it goes.
Yes. This is how it goes: "LQ is an open and friendly community for all things Linux and a lot more. To keep it that way Jeremy, the site owner, has put up some rules everyone has to adhere to. You did so when you signed up. If unsure, please reread the rules. With all due respect, the thread you started is not considered content LQ wants to be associated with and will be dealt with accordingly."


Before I close the thread a few unsorted remarks if I may. In general, do not trust PoC or exploit code unless you have safe(!) ways of verifying it's proper working. If this is the PoC I think it you wouldn't even need the PoC: it's all about *timing* (like pam_login nodelay). If you already figured out the version of the server to be below that mentioned in the PoC (which is old: 2003 I'd say) then what's the use in testing? Finally it's a Darwinian thing, why waste time? ditch Proftpd and go for a server that has a solid track record for years now: Muddleftpd.


Done. Thread closed.
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
exploit checker linuxtesting2 Linux - Security 3 07-05-2009 02:15 PM
What exploit is this? Boss Hoss Linux - Security 6 06-11-2004 06:16 PM
|more exploit Benamoz Linux - General 3 09-03-2003 04:59 AM
r command exploit WeNdeL Linux - Security 3 11-26-2002 11:45 AM
Webalizer exploit??? pk21 Linux - Security 1 10-27-2002 04:29 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:18 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration