Penetration Testing mailing list archives
Re: [PEN-TEST] Expand right under Win2K
From: Tamas Foldi <geza () KAPU HU>
Date: Tue, 6 Feb 2001 22:01:42 +0100
Hi Colleagues! The first successful attack method was the predictable named pipe manipulateing. The original exploit (you can get from http://www.dogmile.com/files/) works fine with Win2K Professional, but must be edit the source, if you want use with Advenced Server Edition. Thanks for your all help, and speacial thanks for Megyeri Ur, Edwards David, stderr, David Wong, Paul Cardon, K. Sz. Andras, Pascal C. Kocher and Bill Pennington. Best regards, Tamas, Foldi . . _ __ ______________________________________________________ __ _ . . Foldi Tamas - We Are The Hashmark In The Rootshell - Security Consultant crow () kapu hu - PGP: finger://crow () thot banki hu - (+3630) 221-7477
Current thread:
- Re: [PEN-TEST] Expand right under Win2K Gary Flynn (Feb 06)
- Re: [PEN-TEST] Expand right under Win2K Tamas Foldi (Feb 06)
- <Possible follow-ups>
- Re: [PEN-TEST] Expand right under Win2K Reinder Wiersma (Feb 07)
- [PEN-TEST] Hacking SQL queries ... Aurobindo Sundaram (+1 512 918 1390) (Feb 07)
- Re: [PEN-TEST] Hacking SQL queries ... Nicolas GREGOIRE (Feb 07)
- Re: [PEN-TEST] Hacking SQL queries ... Aaron C. Newman (Feb 07)
- Re: [PEN-TEST] Hacking SQL queries ... Florian Specker (Feb 07)
- Re: [PEN-TEST] Hacking SQL queries ... Philip Wagenaar (Feb 07)
- Re: [PEN-TEST] Hacking SQL queries ... Aaron C. Newman (Feb 10)
- [PEN-TEST] Hacking SQL queries ... Aurobindo Sundaram (+1 512 918 1390) (Feb 07)