2009年9月 的日志
How To Decompile Actionscript Code In Swf
Author: xy7[80sec]
EMail: xy7#80sec.com/[email protected]
Site: http://www.80sec.com
Date: 2009-7-27
[ 目录 ]
0x00 前言
0x01 swf 文件头分析
0x02 swf 文件结构
0x03 swf tag类型
0x04 寻找Actionscript代码
0x05 还原带有变量的AS代码段
0x06 总结
0x07 代码示例
阅读全文 »
PHP168 6.0及以下版本漏洞
PPstream 2.6.86.8900 PPSMediaList ActiveX Remote BOF PoC
(1):
<!–
******************************************************************************
PPStream is the most huge p2p media player in the world.
There are two hundred million ppstream users in the world.
The vulnerability is exploitable,but I have no time to make it,you could visit my blog for detail.^@^
welcome to http://0dayexpose.blogspot.com/
COM Object – {D22DE742-04CD-4B5C-A8A3-82AB3DAEC43D} PPSMediaList Control
COM Object Filename : C:\PROGRA~1\PPStream\MList.ocx
RegKey Safe for Script: True
RegkeySafe for Init: True
KillBitSet: False
Company Name : PPStream Inc.
Version : V2.6.86.8900
Web Site : http://www.ppstream.com
*******************************************************************************
阅读全文 »
Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4)
#!/usr/bin/perl
# IIS 5.0 FTP Server / Remote SYSTEM exploit
# Win2k SP4 targets
# bug found & exploited by Kingcope, kcope2<at>googlemail.com
# Affects IIS6 with stack cookie protection
# Modded by muts, additional egghunter added for secondary larger payload
# Might take a minute or two for the egg to be found.
# Opens bind shell on port 4444
# http://www.offensive-security.com/0day/msftp.pl.txt
阅读全文 »
Linux Kernel 2.6 < 2.6.19 (32bit) ip_append_data() ring0 Root Exploit
/*
**
** 0x82-CVE-2009-2698
** Linux kernel 2.6 < 2.6.19 (32bit) ip_append_data() local ring0 root exploit
**
** Tested White Box 4(2.6.9-5.ELsmp),
** CentOS 4.4(2.6.9-42.ELsmp), CentOS 4.5(2.6.9-55.ELsmp),
** Fedora Core 4(2.6.11-1.1369_FC4smp), Fedora Core 5(2.6.15-1.2054_FC5),
** Fedora Core 6(2.6.18-1.2798.fc6).
阅读全文 »