- 俄罗斯方块_RockCarry 一个使用Turbo C编写的俄罗斯方块的游戏
- VB版贪食蛇 经典的游戏
- MyWebServerCode This article explains how to write a simple web server application using C#. Though it can be developed in any .NET supported language
- POTATO_英汉查询 用VB.NET编写的简单英汉查询小程序
- CYPRESS_A3load a3load is 8051 firmware that can be used for uploading or downloading to EZ
- image_processing_source_code 图像处理源码内容: alpha
文件名称:kill-bill.tar
介绍说明--下载内容来自于网络,使用问题请自行百度
I. Introduction
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch.
II. Screenshots
$ ./kill-bill.pl
. kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007)
by Solar Eclipse <solareclipse@phreedom.org>
Usage: kill-bill -p <port> -s <service> host
Services:
iis IIS HTTP server (port 80)
iis-ssl IIS HTTP server with SSL (port 443)
exchange Microsoft Exchange SMTP server (port 25)
smb-nbt SMB over NetBIOS (port 139)
smb SMB (port 445)
If a service is running on its default port you don t have to
specify both the service and the port.
Examples: kill-bill -s iis 192.168.0.1
kill-bill -p 80 192.168.0.1
kill-bill -p 1234 -s smb 192.168.0.1
-I. Introduction This code exploits a previously undisclosed vulnerability in decoding the bit string code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04 -007 patch. II. Screenshots $. / kill-bill.pl. kill-bill : Microsoft ASN.1 remote exploit for CAN-2003 - 0818 (MS04-007) by Solar Eclipse
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch.
II. Screenshots
$ ./kill-bill.pl
. kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007)
by Solar Eclipse <solareclipse@phreedom.org>
Usage: kill-bill -p <port> -s <service> host
Services:
iis IIS HTTP server (port 80)
iis-ssl IIS HTTP server with SSL (port 443)
exchange Microsoft Exchange SMTP server (port 25)
smb-nbt SMB over NetBIOS (port 139)
smb SMB (port 445)
If a service is running on its default port you don t have to
specify both the service and the port.
Examples: kill-bill -s iis 192.168.0.1
kill-bill -p 80 192.168.0.1
kill-bill -p 1234 -s smb 192.168.0.1
-I. Introduction This code exploits a previously undisclosed vulnerability in decoding the bit string code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04 -007 patch. II. Screenshots $. / kill-bill.pl. kill-bill : Microsoft ASN.1 remote exploit for CAN-2003 - 0818 (MS04-007) by Solar Eclipse
(系统自动生成,下载前可以参看下载内容)
下载文件列表
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.