lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <38200.207.44.164.74.1063760691.squirrel@redrazor.net>
From: pdt at jackhammer.org (pdt@...khammer.org)
Subject: EXPLOIT : RPC DCOM (MS03-039)

Has anyone tested this exploit successfully?  I havn't been able to make
it work as of yet.  I tried the Target 0 type and have the exact DLL
versions referenced.  Just wondering if this is BS or there is some other
dependency on my test systems that isn't quite lining up.


Reguardless I think I am going to throw a sleeping bag in the back of the
car on the way to work tomorrow, I think there are some long days coming
up soon.


>RPC DCOM long filename heap overflow Exploit (MS03-039)
>
>http://www.k-otik.com/exploits/09.16.MS03-039-exp.c.php
>
>blaster.b soon ?




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ