Apple QuickTime 7.2/7.3 — Remote Buffer Overflow Exploit — (Perl Edition )

7 01 2010

I usually don’t just go and post exploits without much explanation.
I just thought this exploit would be interesting to study since it’s a popular program.
Also, the exploit was coded before, but only in python and ruby, so since this is a perl version, it deserves to be put on here too.

This is a remote buffer overflow for QuickTime 7.2/7.3

Read the rest of this entry »

Uploading a shell to a website through Local File Inclusion [LFI to RCE]

25 12 2009

First of all, this is not my own work, i’m just spreading the word.

Original article can be found here and full credit goes out to the original author.

1 – Introduction

2 – Finding LFI

3 – Checking if proc/self/environ is accessible

4 – Injecting malicious code

5 – Access our shell

6 – Shoutz

Read the rest of this entry »

Generating exploits coded in… plain english

24 11 2009

Last week at the ACM Conference on Computer and Communications Security, security researchers Joshua Mason, Sam Small, Fabian Monrose, and Greg MacManus presented a method they developed to generate English shell code [PDF]. Using content from Wikipedia and other public works to train their engine, they convert arbitrary x86 shell code into sentences that read like spam, but are natively executable.

Read the rest of this entry »

New 0-Day wordpress exploit

20 10 2009

A new wordpress exploit has been discovered just recently creating a buffer overflow that will generate a lot of traffic. And I mean a LOT.

A quick temporary patch is to add these lines into your apache config file.

Read the rest of this entry »