Computer hacking using EFS Easy Chat Server Buffer Overflow in LAN

This module exploits a stack buffer overflow in EFS Software Easy Chat Server. By sending a overly long authentication request, an attacker may be able to execute arbitrary code. NOTE: The offset to SEH is influenced by the installation path of the program. The path, which defaults to “C:Program FilesEasy Chat Server”, is concatentated with “users” and the string passed as the username HTTP parameter.
Exploit Targets
Easy Chat Server 2.5
Requirement
Attacker: Backtrack 5
Victim PC: Windows XP
Open backtrack terminal type msfconsole

Read more. . .

Leave reply

Back to Top