WINSのやつ
メモだけ。
- Hat-Squad Releases: Windows Internet Name Service (WINS) Remote Heap Overflow Exploit
- ttp://class101.org/36/55/op.php#101_WINS.cpp
C:\>101_WINS\101_WINS.exe"
===================================================[v0.2]====
============Windows Internet Name Service (WINS)=============
============Remote Heap Buffer Overflow Exploit==============
======coded by class101=============[Hat-Squad.com 2005]=====
=============================================================[+] . 101_WINS.exe Target VulnIP (bind mode)
[+] . 101_WINS.exe Target VulnIP VulnPORT (bind mode)
[+] . 101_WINS.exe Target VulnIP VulnPORT GayIP GayPORT (reverse mode)TARGETS:
[+] 1. Win2k SP4 Server English (*) - v5.0.2195
[+] 1. Win2k SP4 Advanced Server English (*) - v5.0.2195NOTE:
The exploit bind a cmdshell port 101 or
reverse a cmdshell on your listener.
A wildcard (*) mean tested working, else, supposed working.
A symbol (-) mean all.
Compilation msvc6, cygwin, Linux.