Metasploit mailing list archives
Exploiting the Microsoft DNS RPC service
From: fperigaud at lexsi.com (Fabien Perigaud)
Date: Thu, 19 Apr 2007 12:08:28 +0200
fab at revhosts.net a ?crit :
French target for Win2003 SP2 coming soon.Seems to be okay for this target too (Win2003 SP1). Fab
There is a CALL DWORD PTR [EBP+0x30] at address 0x00270B0B (UNICODE.NLS base + 10B0B) on Windows 2003 SP2 French. Is this address universal ? -- Fabien Perigaud - Consultant s?curit? - LEXSI - Laboratoire d'EXpertise en S?curit? Informatique Weblog CERT-LEXSI : http://cert.lexsi.com/weblog/ T?l : +33 1 55 86 82 09 E-mail : fperigaud at lexsi.com
Current thread:
- Exploiting the Microsoft DNS RPC service H D Moore (Apr 15)
- Exploiting the Microsoft DNS RPC service Giorgio Casali (Apr 17)
- Exploiting the Microsoft DNS RPC service diaul (Apr 18)
- Exploiting the Microsoft DNS RPC service Fabrice MOURRON (Apr 18)
- Exploiting the Microsoft DNS RPC service fab at revhosts.net (Apr 19)
- Exploiting the Microsoft DNS RPC service Fabien Perigaud (Apr 19)
- Exploiting the Microsoft DNS RPC service diaul (Apr 18)
- Exploiting the Microsoft DNS RPC service Giorgio Casali (Apr 17)