lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: elvar at ooz.net (Elvar)
Subject: DCOM RPC exploit  (dcom.c)

Thanks a lot Paul, that compiled fine now. I have yet to see this exploit
actually work though. I've tested it on multiple 2k/xp machines with all
different service packs and it never seems to affect them.

Regards,
Elvar


----- Original Message ----- 
From: "Paul M. Hirsch" <paul@...tagenoir.org>
To: "Elvar" <elvar@....net>
Cc: "'Full-Disclosure@...ts.Netsys.Com'" <full-disclosure@...ts.netsys.com>
Sent: Saturday, July 26, 2003 8:38 PM
Subject: Re: [Full-Disclosure] DCOM RPC exploit (dcom.c)


> On Sat, Jul 26, 2003 at 07:34:17PM -0500, Elvar wrote:
> > Anyone gotten this to compile in FreeBSD 4.8-stable?
> >
> > <root@irc:elvar>gcc -o dcom dcom.c
> > dcom.c:25: error.h: No such file or directory
>
> Change line 10 to:
>
> #include <errno.h>
>
> Compiles fine on OpenBSD-current/i386.  It failed to exploit
> my W2Ksp3 and XPsp1 boxes/victims.
>
> -Paul
>
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ