lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031110203518.98052.qmail@web41711.mail.yahoo.com> From: alf1num3rik at yahoo.com (Stephen) Subject: Windows RPC4 EXPLOIT ? yes here is the .exe file (attached - rename it to .exe) compiled from the k-otik's source http://www.k-otik.com/exploits/11.07.rpcexec.c.php and some offsets added by the othor ... Cheers --- PhilZ wrote: > It's not a new RPC hole :-) > > It's an exploit for MS03-039. __________________________________ Do you Yahoo!? Protect your identity with Yahoo! Mail AddressGuard http://antispam.yahoo.com/whatsnewfree -------------- next part -------------- A non-text attachment was scrubbed... Name: rpclibc.exe Type: application/octet-stream Size: 18959 bytes Desc: rpclibc.exe Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031110/a474b4a8/rpclibc.exe