# CVE-2010-4221 ProFTPD before 1.3.3c任意代碼執行漏洞
==INFO==
# cve-2010-4221
This exploit was written to study some concepts, enjoy!
## Usage
Proftpd Telnet IAC remote generic exploit
Writen by: F0rb1dd3n
Usage: ./proftpd-exploit
Attack Types: 0 - Socket Reuse
1 - Reverse Shell
2 - Bind Shell
3 - Your own shellcode (raw format)
Just type the target IP, PORT and the type of attack that you chose. The program will ask for another informations like: localhost, local port or remote bind port!
## Disclaimer
You don't need to set a listener for Reverse Shell, because the exploit will handle it for you.
If you choose to use your own shellcode, you will need to set your listener!
==EXP==
https://github.com/JustYoomoon/Exploit/blob/main/cve-2010-4221.zip
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END













请登录后查看评论内容