Microsoft DNS Server Remote Code execution Exploit and analysis Advisory: http://www.microsoft.com/technet/security/advisory/935964.mspx This remote exploit works against port 445 (also Microsoft RPC api used) Author: * Mario Ballano ( mballano~gmail.com ) * Andres Tarasco ( atarasco~gmail.com ) Timeline: * April,12,2007: Microsoft advisory published * April,13,2007: POC Exploit coded * April,14,2007: Microsoft notified about a new attack vector against port 445 (this exploit code) * April,14,2007: Working exploit for Windows 2000 server SP4 (Spanish) * April,15,2007: Working exploit for Windows 2003 server SP2 (Spanish) /GS bypassed * April,16,2007: hackers hax the w0rld and got busted. * April,xx,2007: Lammer release the first buggy worm * Xxxxx,xx,2007: Finally it was true. Nacked photos of Gary m.. being abducted were found at NSA servers http://www.514.es/Microsoft_Dns_Server_Exploit.zip http://www.48bits.com/exploits/dnsxpl.rar http://www.milw0rm.com/sploits/04152007-dnsxpl.rar
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论