lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Law11-OE150kkZIhTrB000071f8@hotmail.com>
From: se_cur_ity at hotmail.com (morning_wood)
Subject: Re: Full-Disclosure digest, Vol 1 #977 - 35 msgs


  -------------------------- snip -------------------------------------
  I've managed to compile it under gcc 3.2.2 without error, yet 
  It doesn't seem to do anything but hang-itself against XP-Professional
  hosts! , as I haven't a 2k box available to test against.
  ------------------------ snip ---------------------------------------

  ive managed to be successfull in exploiting WinXP ( option 5 and 6 ) and Win2k ( option 4 ) with the dcom32.exe sample, on machies in the wild. The effectiveness is shocking... compare to webdav remote exploit that was popular in April.. this RPC exploit is like a snake to a mouse, effecient killing at its finest. So those that say this is a non-issue or the code not effective... rember that fine cup of STFU i offered earlier.... have another cup mmmmmkay


  morning_wood

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030727/58861d91/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ