KNet Web Server Buffer Overflow Exploit (SEH)

This exploit takes advantage of KNet web server buffer overflow vulnerability and attempts to gain SHELL access on target host. See demo video here..



Exploit: https://code.google.com/p/yehg-core-exploits/source/browse/trunk/knet-web-server/knet_win7_bof-seh-sploit.rb
Demo: http://core.yehg.net/lab/pr0js/training/view/KNet_Win7_Sploit/

About KNet Web Server:

KNet is a small, functioning, webserver which you can use to host a website from your very own harddrive! KNet is so small you can run your server from a floppy disk. As KNet is a freeware application you will never be charged for using the application or for updates. 

You can literally have your website up and running within 30 seconds of installing, and running KNet. How's that for ease of use? And you need never see or think about KNet again as it can happily run in your task bar.

Here are some key features of "KNet":

■ Custom 404 Error pages.
■ Password protection.
■ Ban IP addresses.
■ Current Connections list.
■ Last Connection.
■ Last Page Requested.
■ Last File Requested.
■ Supports .ppt, .doc and .xls files direct to browser!
■ Incredibly fast and easy to use!
■ Directory traversing blocked....

Ref:  http://knet.softpedia.com/

Popular posts from this blog

CubeCart 3.0.20 (3.0.x) and lower | Multiple Cross Site Scripting Vulnerabilities

Open-Realty CMS 3.x | Persistent Cross Site Scripting (XSS) Vulnerability

OxWall 1.1.1 <= Multiple Cross Site Scripting Vulnerabilities (CVE-2012-0872)