Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Shows when no limits are set or restricted shell or bat access
From: "Clairmont, Jan M" <jan.m.clairmont () citigroup com>
Date: Mon, 4 Oct 2004 15:08:40 -0400

;;for %i in (*.exe) do start %i %n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n%n
;;for %i in (*.exe) do start %i AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.... (type as ;;much "A"-s as cmd.exe allows 
on one line.)

Any system UNIX at least use to churn and eat system resources with a spawned
shell, this is not new on any system.    With unlimited program execution  you can
lock almost any system with a repeating shell program, but cute anyway.8->

Jan Clairmont
Unix Security Support/Consultant

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]