Minggu, 14 Oktober 2012

Exploit Application CoolPlayer

Ollydbg managed to find an address in the memory file shell32

 SEH Chain,the application crashes


convert the value of EIP 7C9D30D7 to form "\ xD7 \ x30 \ xD9 \ x7C" which will be DEADBEEF by fuzzer, then run back fuzzer





 to open the pages were typing root @ bt: ~ # cd / pentest/exploits/framework2 /
thenroot @ bt: ~ #. / msfweb



then open it in webbrowser and type 127.0.0.1:55555
if it had come to this command, windows under control, as in the example call calculator



 next step change value of EIP to address JMP ESP



 Line of code below is the code used to call the calculator .. copy then input into the fuzzer then execute again going out to eat coolplayer calculator, it happens because the windows are controlled by the attacker







0 Komentar:

Posting Komentar

Berlangganan Posting Komentar [Atom]

<< Beranda