Re: WebDAV exploit: using wide character decoder scheme

2003-03-27 Thread JW Oh
In-Reply-To: <[EMAIL PROTECTED]> > >Unfortunately, on my US Windows 2K SP3 build (and I assume all others), >those %u directives get translated into question marks. (0x003F in hex) >:< I tested it only on Korean version of Windows(Server and Professional edition). > >This exploit must be much e

Re: Eat gopher!

2002-07-29 Thread JW Oh
Updated version of eat gopher... with minor fix... visit http://monkey.org/~mat for latest verrsion.. #!/usr/bin/perl # # [EMAIL PROTECTED] # 2002.7.27 # IE gopher buffer overflow exploit # only tested with my W2k Korean and Wme Korean windows OS... # you maybe have to change some addresses with

revised version of .ida exploit

2001-07-24 Thread JW Oh
Sorry previous one is wrong with some code. #!/bin/sh # .ida nasty exploit # [EMAIL PROTECTED],[EMAIL PROTECTED] # http://monkey.org/~mat # # If this exploit succeeds, you can get into the machine through port 8008 # shellcode generated by DeepZone generator # I only tested this code under W2k K

Simple .ida exploit method and POC code.

2001-07-24 Thread JW Oh
Simple .ida exploit method and POC code. so simple and nasty, use at your own risk! #!/bin/sh # .ida nasty exploit # [EMAIL PROTECTED],[EMAIL PROTECTED] # http://monkey.org/~mat # # If this exploit succeeds, you can get into the machine through port 8008 # shellcode generated by DeepZone genera

UltraBoard cgi directory permission problem

2001-01-12 Thread JW Oh
Hacksware Bug Report 1. Name: UltraBoard cgi directory permission problem 2. Release Date: 2001.1.12 3. Affected Application: UltraBoard 2000 Personal Edition Version 2.11 http://www.ub2k.com/downloads/UB211PEB1.zip 4. Author: [EMAIL PROTECTED] 5. Type: Configuration Error 6. Explanation I