MS Windows Server Service Code Execution (MS08-067)

You may also like...

1 Response

  1. yt says:

    videodaki exploit python ile yazılmış linkte verdiğiniz c sanırım.

    http://milw0rm.com/exploits/7132 videodaki exploit bu ama backtrackte kullanmayı denediğimde hata alıyorum.

    bt ~ # python 7132.py
    #######################################################################
    # MS08-067 Exploit by Debasis Mohanty (aka Tr0y/nopsled)
    # http://www.hackingspirits.com
    # http://www.coffeeandsecurity.com
    # Email: d3basis.m0hanty @ gmail.com
    #######################################################################

    Traceback (most recent call last):
    File “7132.py”, line 90, in
    if sys.argv[2]==’1′: #Windows 2000 Payload
    IndexError: list index out of range

    kendi serverımızda 445 nolu port açık.etkilenip etkilenmiceğini denemek istiyorum.
    birde bişey farkettim xp sp2 lerde frameworkteki işlemleri yaptığımda 445 nolu portun kapandığını gördüm sebebi ne olabilir ?

Leave a Reply

Your email address will not be published. Required fields are marked *

CEH Türkiye Hosting Sponsoru