Bwaaha! You could modify the uw-imapd exploit to take over up to date uw-imapdz so they give you a shell (needs a username + password combination then and requires an MTA to run aside uw-imapd).
Just a thought. Cheerio, Kingcope On Mo, 2010-03-15 at 21:36 +0100, Kingcope wrote: > I just saw an error in the uw-imapd exploit. > It's slightly broken. > > replace the line telling > > print $sock2 "RCPT TO kco...@$remhost[1]\r\n"; > > with > > print $sock2 "RCPT TO $ARGV[1]"."\...@$remhost[1]\r\n"; > > then it should be fine. > > > On Mo, 2010-03-15 at 21:27 +0100, Kingcope wrote: > > (See Attached) > > > > Cheers, > > > > Kingcope > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
