软件名称: |
Serv-UMDTM.rar |
文件类型: |
|
|
界面语言: |
简体中文 |
软件类型: |
国产软件 |
运行环境: |
WinNT/2K/Xp |
授权方式: |
共享软件 |
软件大小: |
25K |
软件等级: |
★★★★☆ |
发布时间: |
2004-02-27 |
官方网址: |
http://vfocus.net 作者:SWAN |
演示网址: |
|
软件说明: |
|
Serv-U allows a MDTM command that less than 294 bytes, it is too short to exploit.
However, we could send a MDTM command as long as we wish, and we can easily find our
raw buffer in the memory. To be brief, you can find that near [edi] when overflow
happened. So search from the edi, and you can exploit it.
My way to exploit this could be described as follow:
+------+----------------------+---------+------+---------+
│ MDTM │ long buffer with '+' │ buffer1 │ <SP> │ buffer2 │
+------+----------------------+---------+------+---------+
buffer1:
+--------------+--------------------+-------------------+
│nop nop jmp 4 │ addr of "call ebx" │ short search code │
+--------------+--------------------+-------------------+
buffer2: (as the filename)
+----------------+----------------+-------------+
│flag 0x90909090 │ real shellcode │ flag 'SWAN' │
+----------------+----------------+-------------+
The real shellcode must be a valid filename, see the "site chmod exploit" to get
more information about how to make the shellcode valid.
详情见http://vfocus.net/file/list.asp?id=268
http://vfocus.net/file/list.asp?id=267 |
|
下载地址: |
进入下载地址列表
|
下载说明: |
☉推荐使用网际快车下载本站软件,使用 WinRAR v3.10 以上版本解压本站软件。
☉如果这个软件总是不能下载的请点击报告错误,谢谢合作!!
☉下载本站资源,如果服务器暂不能下载请过一段时间重试!
☉如果遇到什么问题,请到本站论坛去咨寻,我们将在那里提供更多 、更好的资源!
☉本站提供的一些商业软件是供学习研究之用,如用于商业用途,请购买正版。 |
|
[推荐]
[评论(0条)] [返回顶部] [打印本页]
[关闭窗口] |
|
|
|
|
|
|
推荐广告 |
|
|
|
|