The same vulnerability to x_hp-ux11i_nls_ct.c,but exploit ping command to get root shell.
标签: vulnerability i_nls_ct exploit command
上传时间: 2015-01-20
上传用户:aa17807091
I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1
标签: I. vulnerability Introduction undisclosed
上传时间: 2015-05-15
上传用户:xhz1993
America鈥檚 energy vulnerability
标签: vulnerability America energy
上传时间: 2013-12-28
上传用户:zhangyi99104144
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there keep a unix box around to use tools such as Netcat or to test their systems with the unix version of an NT vulnerability exploit. With Netcat for NT part of that feeling disempowerment is over.
上传时间: 2017-04-02
上传用户:onewq
W32.Blaster.Worm is a worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun vulnerability (BID 8205). http://www.symantec.com/security_response/writeup.jsp?docid=2003-081113-0229-99&tabid=2
标签: exploiting propagates Microsoft Interface
上传时间: 2013-12-18
上传用户:zhuyibin
The term “ smart grid ” defi nes a self - healing network equipped with dynamic optimiza- tion techniques that use real - time measurements to minimize network losses, maintain voltage levels, increase reliability, and improve asset management. The operational data collected by the smart grid and its sub - systems will allow system operators to rapidly identify the best strategy to secure against attacks, vulnerability, and so on, caused by various contingencies. However, the smart grid fi rst depends upon identifying and researching key performance measures, designing and testing appropriate tools, and developing the proper education curriculum to equip current and future personnel with the knowledge and skills for deployment of this highly advanced system.
上传时间: 2020-06-07
上传用户:shancjb