lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040922204430.97974.qmail@web52707.mail.yahoo.com> From: elvi52001 at yahoo.com (ElviS .de) Subject: Windows MS04-028 JPEG Overflow Shellcoded Exploit game over ! Microsoft Windows MS04-028 JPEG Overflow Shellcoed Exploit // Sample shellcode is provided // You can put approx. 2500 bytes of shellcode...who needs that much anyway // Tested on an unpatched WinXP SP1 http://www.k-otik.com/exploits/09222004.ms04-28-cmd.c.php http://www.k-otik.com/exploits/09222004.ms04-28.sh.php - --------------------------------- Do you Yahoo!? Yahoo! Mail Address AutoComplete - You start. We finish. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040922/7debce5d/attachment.html