Skip to content

This project contains a Rust code implementation of an exploit targeting the vsftpd 2.3.4 vulnerability. The exploit aims to gain unauthorized access to a target IP address running vsftpd 2.3.4 by taking advantage of the security flaw.

License

Notifications You must be signed in to change notification settings

BugsBound/exploit_vsftpd_backdoor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Rust Exploit for vsftpd 2.3.4

This Rust code is an exploit for the vsftpd 2.3.4 vulnerability. It attempts to hack a target IP address running vsftpd 2.3.4 and opens a shell on port 6200 if successful. The code utilizes the tokio library for asynchronous I/O operations.

Usage

  1. Clone the repository or create a new Rust project.
  2. Build and run the code using the following commands:
cargo build
cargo run <IP_ADDRESS>

Replace <IP_ADDRESS> with the IP address of the target vsftpd server.

Release

The latest release of this exploit can be found on the Release Page. It includes the compiled binary and the source code.

To use the release, follow these steps:

  1. Visit the Release Page.
  2. Download the release archive for the desired version.
  3. Extract the contents of the archive to a desired location.
  4. Open your terminal and navigate to the extracted directory.
  5. Run the exploit with the following command:
./exploit_vsftpd_backdoor <IP_ADDRESS>

Replace <IP_ADDRESS> with the IP address of the target vsftpd server.

Features

  • Checks if the provided input is a valid IP address.
  • Establishes a TCP connection with the target IP on port 21.
  • Verifies if the server response indicates the presence of vsFTPd 2.3.4.
  • Sends the USER and PASS commands to the server.
  • Opens a shell on port 6200 if authentication is successful.
  • Allows input of shell commands from the user.
  • Sends user commands to the server and displays the output.
  • Exits the shell when the user inputs "exit".

Disclaimer

This code is provided for educational and informational purposes only. Use this code responsibly and ensure that you have proper authorization to test or exploit a target system. Using this code without permission on systems you don't own or have legal authorization to access is illegal. The author and OpenAI disclaim any responsibility for any misuse or illegal activities performed with this code.

Use at your own risk!

About

This project contains a Rust code implementation of an exploit targeting the vsftpd 2.3.4 vulnerability. The exploit aims to gain unauthorized access to a target IP address running vsftpd 2.3.4 by taking advantage of the security flaw.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages