lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031110202901.98877.qmail@web41705.mail.yahoo.com> From: alf1num3rik at yahoo.com (Stephen) Subject: Windows RPC 4 ? [Exploit] yes here is the .exe file (attached) compiled from the k-otik's source http://www.k-otik.com/exploits/11.07.rpcexec.c.php and some offsets added by the othor ... --- PhilZ wrote: > It's not a new RPC hole :-) > > It's an exploit for MS03-039. __________________________________ Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard http://antispam.yahoo.com/whatsnewfree -------------- next part -------------- A non-text attachment was scrubbed... Name: rpclibc.exe Type: application/octet-stream Size: 18959 bytes Desc: rpclibc.exe Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031110/d77ec4c1/rpclibc.exe