lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <492099c7.0e1b6e0a.7a4a.ffff9c9a@mx.google.com> Date: Mon, 17 Nov 2008 03:38:02 +0530 From: "Debasis Mohanty" <debasis.mohanty.listmails@...il.com> To: <full-disclosure@...ts.grok.org.uk> Subject: Microsoft Windows Server Service (MS08-067) Exploit Having not found one (except msf) that reliably works against my own setup thought of writing my own MS08-067 exploit piece. Plugged the shellcode for win2k and win2k3[sp2]. No plans for updating the xp shellcode. Grab the python here: http://www.hackingspirits.com/vuln-rnd/vuln-rnd.html -d www.coffeenandsecurity.com www.hackingspirits.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/