Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: New REmote Windows Exploit (MS04-029)
From: Peter Hickman <peter () semantico com>
Date: Thu, 04 Nov 2004 14:09:54 +0000

DanB UK wrote:
Anyone compiled and tested this yet ?


Cor blimy! I really hope you are joking.

Have you ever used perl before?
It's an interpreted language!

And this code looks like it connects to an irc server(ir3ip.net) joins
a channel(#0x) then messages the user k.
Might have messed that slightly only looked at it for a minute.

Cheers,
Dan.


It waits for a private message from k and then shells out and executes it and posts the results back as a private message.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]