• Close
  • Back to search

    CCProxy Telnet Proxy Ping Overflow

    This module exploits the YoungZSoft CCProxy <= v6.2 suite Telnet service. The stack is overwritten when sending an overly long address to the 'ping' command.

    Free Metasploit Download

    Get your copy of the world's leading penetration testing tool

     Download Now

    Module Name

    exploit/windows/proxy/ccproxy_telnet_ping

    Authors

    • patrick <patrick [at] osisecurity.com.au>

    References

    Targets

    • Windows 2000 Pro All - English
    • Windows 2000 Pro All - Italian
    • Windows 2000 Pro All - French
    • Windows XP SP0/1 - English
    • Windows XP SP2 - English

    Platforms

    • windows

    Architectures

    • x86

    Reliability

    Development

    Module Options

    To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

    msf > use exploit/windows/proxy/ccproxy_telnet_ping msf exploit(ccproxy_telnet_ping) > show targets ...targets... msf exploit(ccproxy_telnet_ping) > set TARGET <target-id> msf exploit(ccproxy_telnet_ping) > show options ...show and set options... msf exploit(ccproxy_telnet_ping) > exploit