Welcome![Sign In][Sign Up]
Location:
Search - jpg exploit

Search list

[Internet-NetworkWinJPEG(GDI+)Exp_MS04-028.c

Description: 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellcode is provided // You can put approx. 2500 bytes of shellcode...who needs that much anyway // Tested on an unpatched WinXP SP1-classification tools : running attack platforms : Windows tool Size : MD5 7577 Bytes Document : 28f6d5f4d818438522a3d0dc8a3fa46b tools Source : securiteam.com / / GDI buffer overrun by FoToZ exploit / / NB : the headers here are only sample taken from a headers. JPG file , / / FE with the FF 00 01 inserted in header1. / / Sample Shellcode is provided / / You can put approx. 2500 bytes of Shellcode ... who needs that much anyway / / Tested on an unpatched WinXP SP1
Platform: | Size: 3165 | Author: 亭枫 | Hits:

[Internet-NetworkWinJPEG(GDI+)Exp_MS04-028.c

Description: 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellcode is provided // You can put approx. 2500 bytes of shellcode...who needs that much anyway // Tested on an unpatched WinXP SP1-classification tools : running attack platforms : Windows tool Size : MD5 7577 Bytes Document : 28f6d5f4d818438522a3d0dc8a3fa46b tools Source : securiteam.com// GDI buffer overrun by FoToZ exploit// NB : the headers here are only sample taken from a headers. JPG file ,// FE with the FF 00 01 inserted in header1.// Sample Shellcode is provided// You can put approx. 2500 bytes of Shellcode ... who needs that much anyway// Tested on an unpatched WinXP SP1
Platform: | Size: 3072 | Author: | Hits:

CodeBus www.codebus.net