Full Disclosure mailing list archives
Re: New REmote Windows Exploit (MS04-029)
From: Peter Hickman <peter () semantico com>
Date: Thu, 04 Nov 2004 14:09:54 +0000
DanB UK wrote:
Anyone compiled and tested this yet ?Cor blimy! I really hope you are joking.Have you ever used perl before?It's an interpreted language! And this code looks like it connects to an irc server(ir3ip.net) joins a channel(#0x) then messages the user k. Might have messed that slightly only looked at it for a minute. Cheers, Dan.
It waits for a private message from k and then shells out and executes it and posts the results back as a private message.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: New REmote Windows Exploit (MS04-029), (continued)
- Re: New REmote Windows Exploit (MS04-029) DanB UK (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Ferdinand Klinzer (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Vincent Archer (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Ferdinand Klinzer (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Steve Hulshof (Nov 04)
- RE: New REmote Windows Exploit (MS04-029) raza (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) KF_lists (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Michael Riedel (Nov 04)
- Re: New REmote Windows Exploit (MS04-029) Valdis . Kletnieks (Nov 04)
- RE: New REmote Windows Exploit (MS04-029) Barrie Dempster (Nov 04)