Home page logo

metasploit logo Metasploit mailing list archives

Ret for dabian linux
From: ubt <pro.info.ubt () gmail com>
Date: Mon, 14 Jun 2010 11:15:51 +0800

I've got a large amount of connection,whereas my machine was idle, from
an ip, which I first scaned to find the ssh service open on that
machine,then run hdm's openssh fuzzer against and found the service
crashed on iteration about 8600. I modified the fuzzer source file a
little bit intending to build an exploit,but couldn't figure out the
'ret' value to be inserted. Any idea?


  By Date           By Thread  

Current thread:
  • Ret for dabian linux ubt (Jun 14)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]