-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Use this code: http://www.cyberphreak.ch/sploitz/MS03-039.txt
 
This works fine 4 me… ;).
 
Greets Flo
 
- - -----Ursprüngliche Nachricht-----
Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Peter King
Gesendet: Samstag, 11. Oktober 2003 10:29
An: [EMAIL PROTECTED]
Betreff: Re: [Full-Disclosure] Bad news on RPC DCOM2 vulnerability
 
why those *security* sites keep *exploits* online even when they know that this is an 
unpatched vuln !!!!
 
personnaly i'd like to test this exploit on my systems, but can't compile it 
http://www.k-otik.com/exploits/10.09.rpc2universal.c.php
 
can anyone post the .exe please, to test our machines ...
 
Cheers.

petard <[EMAIL PROTECTED]> wrote:
On Fri, Oct 10, 2003 at 07:05:46PM -0500, Bobby Brown wrote:
> So I can "assume" no other information is posted, other than this site, to 
> collaborate the RPC issue is not resolved or should we all try to translate this 
> site using the helpful hints, which they are?
> 
> 
k-otik posted some similar if not identical code, corroborating (to a point anyway) its
effectiveness. (It most likely worked for one of them if they posted it.)

I suggest taking the linked code, compiling it (use MSVC7) and testing it to confirm
for yourself. Please test on a machine that's not connected to the internet, though :-)

HTH,

petard
  _____  

Do you Yahoo!?
The New Yahoo! Shopping - with improved product search

- -----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBP4fUq8cVx+1s2h/BEQIe+gCfbIBU0EG/Oj7Uu17XtcrZvthy0UkAoIKf
8LFGmJWP0pBBKP2TPqOKjHvy
=1RpU
- -----END PGP SIGNATURE-----

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBP4fVEscVx+1s2h/BEQJ+pQCfYw73WRH1A6KD15vhX8Z5U9vyNhoAnjoH
5iV29moO+mDDCNymwguVRjZS
=ZZtA
-----END PGP SIGNATURE-----
 

Attachment: PGPexch.rtf.pgp
Description: Binary data

Reply via email to