32 lines
No EOL
793 B
Text
32 lines
No EOL
793 B
Text
###########################################################################
|
|
#
|
|
# Title: uTorrent <=2.0.3 Dll Hijacking Local Exploits
|
|
# By: Dr_IDE
|
|
# Tested: Windows 7RC
|
|
# Note: These are additional DLL's with unsafe Load Paths
|
|
# Reference: http://www.exploit-db.com/exploits/14726/
|
|
#
|
|
############################################################################
|
|
|
|
If the payload .DLL file is renamed to any of these files and placed in the
|
|
utorrent.exe directory, the payload will be executed with users' credentials.
|
|
|
|
-userenv.dll
|
|
|
|
-shfolder.dll
|
|
|
|
-dnsapi.dll
|
|
|
|
-dwmapi.dll
|
|
|
|
-iphlpapi.dll
|
|
|
|
-dhcpcsvc.dll
|
|
|
|
-dhcpcsvc6.dll
|
|
|
|
-rpcrtremote.dll
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz)
|
|
|
|
#[pocoftheday.blogspot.com] |