[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY2-F88RaNgEpTX5V3000000bd@hotmail.com>
From: bobbymanly at hotmail.com (bobby manly)
Subject: -- command line unix rpc/dcom vulnerability checker -- from buildtheb0x
brought to you by:
--------------------------
kid : ironkid@...ldtheb0x.com
and
farp : farp@...ldtheb0x.com
#gcc -odcom_scanz dcom_scanz.c
# ./dcom_scanz
usage: dcom-isvuln <target-ip> [--debug]
# ./dcom_scanz 10.1.1.25
[+] Connecting to 10.1.1.25
[+] Sending DCERPC, Bind: call_id: 9 UUID: REMACT
[+] Sending REMACT, RemoteActivation reques
[+] Making second connect()
[+] Sending DCERPC, Bind: call_id: 1702446437 UUID: REMACT
[+] Sending REMACT, RemoteActivation request
-- 10.1.1.25 appears to be vulnerable!
_________________________________________________________________
Protect your PC - get McAfee.com VirusScan Online
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: dcom_scanz.c
Url: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030802/d018d1be/dcom_scanz.c
Powered by blists - more mailing lists