This Rust code is an exploit for the vsftpd 2.3.4 vulnerability. It attempts to hack a target IP address running vsftpd 2.3.4 and opens a shell on port 6200 if successful. The code utilizes the tokio
library for asynchronous I/O operations.
- Clone the repository or create a new Rust project.
- Build and run the code using the following commands:
cargo build
cargo run <IP_ADDRESS>
Replace <IP_ADDRESS>
with the IP address of the target vsftpd server.
The latest release of this exploit can be found on the Release Page. It includes the compiled binary and the source code.
To use the release, follow these steps:
- Visit the Release Page.
- Download the release archive for the desired version.
- Extract the contents of the archive to a desired location.
- Open your terminal and navigate to the extracted directory.
- Run the exploit with the following command:
./exploit_vsftpd_backdoor <IP_ADDRESS>
Replace <IP_ADDRESS>
with the IP address of the target vsftpd server.
- Checks if the provided input is a valid IP address.
- Establishes a TCP connection with the target IP on port 21.
- Verifies if the server response indicates the presence of vsFTPd 2.3.4.
- Sends the
USER
andPASS
commands to the server. - Opens a shell on port 6200 if authentication is successful.
- Allows input of shell commands from the user.
- Sends user commands to the server and displays the output.
- Exits the shell when the user inputs "exit".
This code is provided for educational and informational purposes only. Use this code responsibly and ensure that you have proper authorization to test or exploit a target system. Using this code without permission on systems you don't own or have legal authorization to access is illegal. The author and OpenAI disclaim any responsibility for any misuse or illegal activities performed with this code.
Use at your own risk!