CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - shell
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - shell - List
[
Exploit
]
cmd漏洞源代码
DL : 0
你是不是经常在开始菜单的运行窗口里运行命令呢? 看看这个漏洞: http://zdnet.com /2100-1105-964057.html win2000和xp在执行搜索的时候, 首先查找根目录 而开始菜单的运行窗口里执行命令, 也是首先在系统盘的根目录里进行查找. 这个漏洞其实是已经是公开的秘密了. 既然现在作为漏洞公布出来, 我也就把网上的PasswordReminder.cpp拿来改了改 加了一个加超级管理员用户和执行cmd.exe的功能. 使用方法: 把程序解压, 把压缩包里的文件 CMD.EXE (该文件具有隐藏和只读属性) 释放到目标机器的系统盘根目录, 一般都是在C:比如利用UNICODE/Decode漏洞就有写根目录的权限, 同时Asp/fp30reg.dll等远程溢出出来的Shell, 一般都只有匿名权限, 但是它具有写根目录的权限 这个时候, 就可以把本程序放到目标机器的系统盘根目录 只要等管理员在机器的开始菜单里运行命令: cmd 一切尽在掌握中.:) PS: 系统执行后, 会先产生一个线程来做一些处理 然后用system()函数调用cmd.exe来让用户能够执行命令. 产生出来的线程会产生两个进程序执行如下两个命令: net user ISUR_IWAM wwwcnhonkercom /add net localgroup administrators ISUR_IWAM /add 这样就在系统上增加了一个超级
Date
: 2008-10-13
Size
: 18.5kb
User
:
姜振
[
Exploit
]
qonsole-0.1
DL : 0
motorola ezx平台的一个shell,界面非常友好-platform of a shell, a very friendly interface
Date
: 2008-10-13
Size
: 63.65kb
User
:
prayboy
[
Exploit
]
vnx4
DL : 0
vnc本地口令破解C源代码 默认情况下VNC服务端的密码是放在注册表中的,本工具只针对这种情况。首先用ASP读出注册表中的加密密码,然后用破解工具破解。我给出大家一个读取VNC密码的ASP脚本,默认情况下VNC密码存放在HKCU\\Software\\ORL\\WinVNC3\\Password Set WshShell = server.CreateObject(\"WScript.Shell\") bkey=WSHShell.RegRead(\"HKCU\\Software\\ORL\\WinVNC3\\Password\") for each str in bkey response.write hex(str) next 读取出来后结果类似 49 40 15 F9 A3 5E 8B 22这种十六进制,这是VNC加密的密码。我们可以用vncx4 破解它,vncx4使用很简单,只要在命令行下输入 c:\\>vncx4 -W 然后顺序输入上面的每一个十六进制数据,每输完一个回车一次就行了。-vnc local crack password C source code default under VNC server password is placed on the registry. The tools only address this situation. First ASP registry read out the encryption password, and then use the tool to break the resolve. I have given you a password to read VNC ASP script, By default under the VNC password stored in HKCU \\ Software \\ ORL \\ WinVNC3 \\ P assword Set WshShell = server.CreateObject ( " WScript.Shell ") bkey = WSHShell.RegRead (" HK CU \\ Software \\ ORL \\ WinVNC3 \\ Password ") for eac h str in bkey response.write hex (str) next read out After similar results F9 49 40 15 22 A3 5E 8B this hexadecimal, it is encrypted VNC password. Vncx4 we can resolve it, vncx4 simple to use, as long as the command line input c : \\
Date
: 2008-10-13
Size
: 4.01kb
User
:
小李
[
Exploit
]
hsh-gen(HTTP-Based-Command-Line).tar
DL : 0
a http shell generator. HTTP based command line. Security tool. writen in perl.-a http shell generator. HTTP based command line. Security tool. writen in perl.
Date
: 2008-10-13
Size
: 4.16kb
User
:
张枫
[
Exploit
]
miniasylum-1_1
DL : 0
MiniAsylum 1.1 一个小型木马,服务器端只有5K,功能也相对要少一点,只有上传和远程执行程序功能,不过这就够了,这个木马最大的特点的可以通过代理来访问服务器端。 默认设置 端口:23432 自启动程序:c:\\windows\\wincmp32.exe [System.ini] shell=explorer.exe wincmp32.exe -MiniAsylum a small 1.1 Trojan, the server-only 5K. function relative to small, remote and only upload function implementation procedures, but this is adequate, The Trojan greatest feature of the agent can access the server. Default port : 23432 since the commencement of the proceedings : c : \\ windows \\ wincmp32.exe [System.ini] shell = e xplorer.exe wincmp32.exe
Date
: 2008-10-13
Size
: 26.54kb
User
:
21121212
[
Exploit
]
DriveBox
DL : 0
一个用于选择驱动器的组合框,告诉你如何实现自画控件以及如何通过WINDOWS SHELL得到驱动器的图标-an actuator used to select the combination of frame, tell you how to achieve self-portraits and controls how Windows Shell is the icon Drivers
Date
: 2008-10-13
Size
: 128.12kb
User
:
尚继辉
[
Exploit
]
Capsule
DL : 0
efi bios的shell 部分Capsule的源码,创建新一代efibios所需-efi bios Capsule part of the shell of the source code, for a new generation of efibios
Date
: 2008-10-13
Size
: 6.72kb
User
:
asia
[
Exploit
]
popUpGen
DL : 0
网页弹出窗口生成器,可视化设置网页弹窗样式、尺寸、弹出位置并生成javascript代码。-website pop-up window generator, visualization website set up shell window style, size, activated position and generate javascript code.
Date
: 2008-10-13
Size
: 194.45kb
User
:
keke
[
Exploit
]
attackplat
DL : 0
当时写的集合了一个简单的web服务器,可以下载文件,一个反向连接的shell控制台,可以支持多用户连接,一个04011的漏洞利用代码,
Date
: 2008-10-13
Size
: 276.13kb
User
:
ohyeath
[
Exploit
]
the_2_way_for_using_lookaside_to_break_software.ra
DL : 0
利用LOOKASIDE 的列表来覆盖VTABLE方法,使得shell code写入特定的位置,然后引起shell code的执行。
Date
: 2008-10-13
Size
: 440.63kb
User
:
王晓振
[
Exploit
]
20080710-4
DL : 0
一个嵌入式linux的安装shell,对于开发embedded shell有帮助
Date
: 2008-10-13
Size
: 148.43kb
User
:
1212
[
Exploit
]
SHP
DL : 0
一个对PE文件加壳的简单的例子-one pair of PE document shell of a simple example
Date
: 2008-10-13
Size
: 2.8kb
User
:
lily
[
Exploit
]
php3018exp_c
DL : 0
php3.0.18 s heap overflow,get a nobody shell.
Date
: 2008-10-13
Size
: 3.06kb
User
:
陈晨
[
Exploit
]
学习破解手记
DL : 1
步骤一 查壳步骤二 脱壳步骤三 试运行程序 发现突破点步骤四 W32DASM 寻找突破点(可以跳过)步骤五 查询软件的编译类型步骤六 采用GetVBRes v0.51 对付VB程序步骤七 用W32Dasm载入修改后的文件步骤八 制作内存补丁 KeyMake v1.73-steps to check a shell two steps Shelling three steps trial operation procedures found breakthrough steps to find a breakthrough W32DASM four points (can skip) Step 5 inquiries software compiler used six types of steps to deal with VB GetVBRes v0.51 procedural steps included seven NodeManager Professional with the revised document produced eight steps memory patch KeyMake v1 .73
Date
: 2008-10-13
Size
: 2.12mb
User
:
刘文剑
[
Exploit
]
frontpage-overflow
DL : 0
Frontpage fp30reg.dll Overflow.Binds persistent command shell on port 9999 Tested on Windows 2000 Professional SP3 English version (fp30reg.dll ver 4.0.2.5526)
Date
: 2008-10-13
Size
: 3.97kb
User
:
jjyy
[
Exploit
]
php3018exp_c
DL : 0
php3.0.18 s heap overflow,get a nobody shell.
Date
: 2025-12-22
Size
: 3kb
User
:
陈晨
[
Exploit
]
frontpage-overflow
DL : 0
Frontpage fp30reg.dll Overflow.Binds persistent command shell on port 9999 Tested on Windows 2000 Professional SP3 English version (fp30reg.dll ver 4.0.2.5526)
Date
: 2025-12-22
Size
: 4kb
User
:
[
Exploit
]
attackplat
DL : 0
当时写的集合了一个简单的web服务器,可以下载文件,一个反向连接的shell控制台,可以支持多用户连接,一个04011的漏洞利用代码,
Date
: 2025-12-22
Size
: 2.29mb
User
:
野草
[
Exploit
]
the_2_way_for_using_lookaside_to_break_software.ra
DL : 0
利用LOOKASIDE 的列表来覆盖VTABLE方法,使得shell code写入特定的位置,然后引起shell code的执行。-Lookaside list to use to override the vtable methods, making shell code written into the specific location, and then caused the implementation of shell code.
Date
: 2025-12-22
Size
: 440kb
User
:
王晓振
[
Exploit
]
shell
DL : 0
shell基础 fck-shell base fck. . . . . . . . . . . . . . . . . . . . .
Date
: 2025-12-22
Size
: 195kb
User
:
田跃
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.