Microsoft Windows Server Service (MS08-067) Exploit
- To: <bugtraq@xxxxxxxxxxxxxxxxx>
- Subject: Microsoft Windows Server Service (MS08-067) Exploit
- From: "Debasis Mohanty" <debasis.mohanty.listmails@xxxxxxxxx>
- Date: Mon, 17 Nov 2008 03:54:46 +0530
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:from:to:subject:date :mime-version:content-type:content-transfer-encoding:x-mailer :x-mimeole:thread-index:message-id; bh=b2Fh6k/Fmfz98Fj5OXGCo7qi/KpTF2NrQSpUkJ0+dGE=; b=H9EpyDa9+S1Px/COC0mjqaNgeQ5m7tdhWLe+WuM+HcOoUiDZouY8daFsxm1VDRkcFy ahgCI6hi3krpumPa8x6q6456OmWbpWRLms6XB9IZl6InTtpaPKPr7EnNo3ZikyKhUA3P lnVaXS0tbOod95pTBhD2b/DnHYb63RSxccBUI=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=from:to:subject:date:mime-version:content-type :content-transfer-encoding:x-mailer:x-mimeole:thread-index :message-id; b=Y7D34Ye14QyrI3bR0lUHFQeZYjlXngF7zBtQAzaQgqnS5cv1ooA0orCJGyxv3M4BXU 9YsNUKIOG2G1M9ES8pvNZ1yyh4wQBW4w/A8l4znoIqmKsXCdhibamtvdbIUpR6jJ/FYu rnJSApTpaOoqsyE4Y1MzBWGZLp3VSMNTXqRPQ=
- List-help: <mailto:bugtraq-help@securityfocus.com>
- List-id: <bugtraq.list-id.securityfocus.com>
- List-post: <mailto:bugtraq@securityfocus.com>
- List-subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
- List-unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
- Mailing-list: contact bugtraq-help@xxxxxxxxxxxxxxxxx; run by ezmlm
- Thread-index: AclIOiGZ9oS78udOTdqH5keHLqy6Zg==
Having not found one (except msf) that reliably works against my own setup
thought of writing my own MS08-067 exploit piece. Plugged the shellcode for
win2k and win2k3[sp2]. No plans for updating the xp shellcode.
Grab the python here:
http://www.hackingspirits.com/vuln-rnd/vuln-rnd.html
-d
www.coffeenandsecurity.com
www.hackingspirits.com