lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: hackerwacker at cybermesa.com (james) Subject: Fw: Windows RPC DCOM Dos exploit ----- Original Message ----- From: "lion" <lion@...onker.net> To: <bugtraq@...urityfocus.com> Sent: Sunday, September 14, 2003 7:42 AM Subject: Windows RPC DCOM Dos exploit : /* : * Windows RPC DCOM Dos exploit : * by bkbll bkbll@...onker.net : * http://www.cnhonker.com : * modified the code from oc192 Security : * : * Usage: : * cl dcomdos.cpp : * dcomdos -d 10.10.10.135 -n 3000 : */ : : Welcome to HUC website: http://www.cnhonker.com : -------------- next part -------------- A non-text attachment was scrubbed... Name: dcomdos.cpp Type: application/octet-stream Size: 14284 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030915/cbeb0366/dcomdos.obj