Penetration Testing mailing list archives

Re: [PEN-TEST] Expand right under Win2K


From: Tamas Foldi <geza () KAPU HU>
Date: Tue, 6 Feb 2001 22:01:42 +0100

Hi Colleagues!


        The first successful attack method was the predictable named pipe
manipulateing. The original exploit (you can get from
http://www.dogmile.com/files/) works fine with Win2K Professional, but
must be edit the source, if you want use with Advenced Server Edition.

        Thanks for your all help, and speacial thanks for Megyeri Ur, Edwards
David, stderr, David Wong, Paul Cardon, K. Sz. Andras, Pascal C. Kocher
and Bill Pennington.

Best regards,
Tamas, Foldi


. . _ __ ______________________________________________________ __ _ . .
Foldi Tamas - We Are The Hashmark In The Rootshell - Security Consultant
   crow () kapu hu - PGP: finger://crow () thot banki hu - (+3630) 221-7477


Current thread: