Full Disclosure mailing list archives

Re: Unusual request


From: Day Jay <d4yj4y () yahoo com>
Date: Thu, 13 Feb 2003 13:19:36 -0800 (PST)

Pauli Shore,

I attached 2 html files that you can use to run your
tests. Just access these html files through a web
browser locally and the rest is self-explanatory and
edumacational-even simple people like you will
understand.

For the rest of you jews: be nice to Paul. Just
because he Schmels don't mean he's all that bad.

PS: Paul: try an advanced G00000LE search next time. 

d4yj4y
day to the motherfucking jay

 


--- Paul Schmehl <pauls () utdallas edu> wrote:
The net is filled with so much junk now, it's
getting harder to find
what you need.  I am looking for an exploit that
will give you "root" on
an unpatched IIS box by simply typing a string in
the address line in
your browser.  I know I've seen it before, but I
can't seem to find it
amongst all the vulns for IIS and all the web logs
that show up when you
google.

I need this for a "security roadshow" that we're
putting together, so I
can demonstrate how easy it is to break in to an
unpatched box.  Can
anybody point me in the right direction?

I don't want exploit code.  This is just a simple
string that you enter
into the URL box in a browser.  It's at least two or
three years old, I
know.

-- 
Paul Schmehl (pauls () utdallas edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/~pauls/
AVIEN Founding Member

_______________________________________________
Full-Disclosure - We believe in it.
Charter:
http://lists.netsys.com/full-disclosure-charter.html


__________________________________________________
Do you Yahoo!?
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com

Current thread: