Front Page Server Overflow attack Instance << original >>
Download: http://www.nsfocus.com/proof/fpse2000ex.c
haha ~ everybody good!! ~ (Curse??!) Dangerous eggs ~ Real more and more "fierce", for a period of time. Printer The smoke is not exhausted, and now come out a FrontPage Server Fp30reg.dll overflow Vulnerability ~ but cheap rookie ... (hehe ~!) The information about the vulnerability to see the announcement above the site! (bytes~! a lot of nonsense!)
to the other. Today I will tell you how to use.
First find A, Little Lamb ~ ~ (ah ~ small devil again into the village!!) ~?) Well, who is it?? You---61.153.xxx.xxx (domestic ~ Don't arrest me ~!! I don't want to go to jail!!). Ping the first, do not timed out! on God!!! ~ Haha!:
Pinging 61.153.xxx.xxxwith bytes of data:
Reply from 61.153.xxx.xx:bytes=32 time=36ms ttl=124
Reply from 61.153.xxx.xx:bytes=32 time=35ms ttl=124
Reply from 61.153.xxx.xx:bytes=32 time=35ms ttl=124
.................. (ah ha ~! speed is good ~ do not take you operation I can not find the reason ~!~ haha ~! me evil??)
Let me start ...
Telnet 211.100.xxx.xxx (My Fat Hen,haha)
Red Hat Linux release 7.0.1J (Guinness) (envy??) ~ haha)
Kernel 2.2.16-22 on a i686
Login:bytes
Passwd:xxxxxxx (Don't tell you, of course, LA)
[Root@glb-linux-1 bytes] #id
Uid=0 (Root) gid=2513 (other) (hehe ~@!)
[Root@glb-linux-1 bytes]# vi kill.c (copy to the original code, by the way, this procedure is very beautiful ~!!)
/*
* Fpse2000ex.c-proof of concept code for Fp30reg.dll overflow bug.
* Copyright (c) 2001-nsfocus.com
*
* Disclaims:
* This is a proof of concept code. This code was for test purpose
* Only and should is run against any host without permission from
* The system administrator.
*
* NSFocus Security Team
* http://www.nsfocus.com
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.