lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: dbailey27 at (Don Bailey)
Subject: I think I have the new RPC Dcom sploit.

An obvious fake.

Everyone knows my code comes standard with a huge header, that
would take at least a day to read. Even for code such as this, I
absolutely *must* document the obscure 'L', 'O' and 'L' statement
in order to clearly exemplify my reasoning.

As the ominous (insert spooky music and/or shivers here) the_ut
recently lamented: "his code is always didactic". Indeed it is,
jimothy jones. Indeed, it is.

Everybody thank the number 943 and the letters E, P and S for
this hilarious spoof.

Happy belated April Fool's day, apparently! :-)

>rpcdcom 5 remote LOCALSYSTEM exploit for winnt, 2k, xp, 2k3
>(C) northern snowfall & SUPERrell
>targets for EN, DE, EE, CN locales
>#include <winsock2.h>
>#include <stdio.h>
>#include <windows.h>
>#include <process.h>
>#include <string.h>
>#include <winbase.h>
>unsigned char requestBind[] = {
>'L', 'O', 'L'};//fuckingtelnet :P
>//#define abort(x) { printf(x); exit(1); }
>//#define lprintf(...) {xlprintf(__LINE__,__FILE__);}
>Full-Disclosure - We believe in it.

Powered by blists - more mailing lists