exploit-db-mirror/exploits/windows/local/14748.txt
Offensive Security d63de06c7a DB: 2022-11-10
2776 changes to exploits/shellcodes/ghdb
2022-11-10 16:39:50 +00:00

32 lines
No EOL
793 B
Text

###########################################################################
#
# Title: uTorrent <=2.0.3 Dll Hijacking Local Exploits
# By: Dr_IDE
# Tested: Windows 7RC
# Note: These are additional DLL's with unsafe Load Paths
# Reference: http://www.exploit-db.com/exploits/14726/
#
############################################################################
If the payload .DLL file is renamed to any of these files and placed in the
utorrent.exe directory, the payload will be executed with users' credentials.
-userenv.dll
-shfolder.dll
-dnsapi.dll
-dwmapi.dll
-iphlpapi.dll
-dhcpcsvc.dll
-dhcpcsvc6.dll
-rpcrtremote.dll
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz)
#[pocoftheday.blogspot.com]