Yeah and + ssh credentials...
Bwaaha! You could modify the uw-imapd exploit to take over up to date uw-imapdz so they give you a shell (needs a username + password combination then and requires an MTA to run aside uw-imapd). Just a thought. Cheerio, Kingcope - Masquer le texte des messages précédents - On Mo, 2010-03-15 at 21:36 +0100, Kingcope wrote: > I just saw an error in the uw-imapd exploit. > It's slightly broken. > > replace the line telling > > print $sock2 "RCPT TO kco...@$remhost[1]\r\n"; > > with > > print $sock2 "RCPT TO $ARGV[1]"."\...@$remhost[1]\r\n"; > > then it should be fine. > > > On Mo, 2010-03-15 at 21:27 +0100, Kingcope wrote: > > (See Attached) > > > > Cheers, > > > > Kingcope >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
