标签 ‘445’ 下的日志

DNSRPCscanner v1.0

鬼仔注:python的版本,我没有测试。配合最近那个DNS的EXP使用。

来源:7jdg's blog

阅读全文 »

Tags: ,

MS Windows DNS RPC Remote Buffer Overflow Exploit (port 445) v2

鬼仔注:V2
看到有朋友留言说不知道怎么编译,这里说下用VC里用Makefile文件编译的方法:
运行cmd.exe
进到vc/bin目录
运行vc-vars32.bat
进到makefile所在的目录
nmake /f makefile

来源:milw0rm

Exploit v2 features:
– Target Remote port 445 (by default but requires auth)
– Manual target for dynamic tcp port (without auth)
– Automatic search for dynamic dns rpc port
– Local and remote 阅读全文 »

Tags: , ,

MS Windows DNS RPC Remote Buffer Overflow Exploit (port 445)

来源:milw0rm

Microsoft DNS Server Remote Code execution Exploit and analysis
Advisory: http://www.microsoft.com/technet/security/advisory/935964.mspx
This remote exploit works against port 445 (also Microsoft RPC api used)

Author:
* Mario Ballano ( mballano~gmail.com )
* Andres Tarasco ( atarasco~gmail.com )

Timeline:
阅读全文 »

Tags: , ,

MS Windows DNS DnssrvQuery Remote Stack Overflow Exploit

来源:milw0rm
阅读全文 »

Tags: , ,