看shellcode是4444port。
不过我用vs2005编译成功不能运行,faint


在08-10-27,黑星 <[EMAIL PROTECTED]> 写道:
>
>  不知道绑定的是哪个端口呢?
>
>
>
>
>
>
>
>
> 在2008-10-27 04:14:53,ring04h <[EMAIL PROTECTED]> 写道:
>
> 顶起,可爱的 win32_bind
>
> 2008/10/27 大风 <[EMAIL PROTECTED]>
>
>>
>>
>> 顶啊,全球首个可用的exp,成功率很不错哦!
>>
>>
>>
>> 顶EMM!
>>
>>
>>
>>
>>
>> *[Ph4nt0m] <http://www.ph4nt0m.org/> *
>>
>> *[Ph4nt0m Security Team]*
>>
>>                *   [EMAIL PROTECTED] <http://blog.ph4nt0m.org/>*
>>
>> *          Email:  [EMAIL PROTECTED]
>>
>> *          PingMe:
>> <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wuhq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724>
>> *
>>
>> *          **=== V3ry G00d, V3ry Str0ng ===***
>>
>> *          === Ultim4te H4cking ===*
>>
>> *          === XPLOITZ ! ===*
>>
>> *          === #_# ===*
>>
>> *#If you brave,there is nothing you cannot achieve.#*
>>
>>
>>  ------------------------------
>>
>> *发件人:* [email protected] [mailto:[EMAIL PROTECTED] *代表 *
>> EMM
>> *发送时间:* 2008年10月27日 1:46
>> *收件人:* [email protected]
>> *主题:* [Ph4nt0m] MS08-067 Exploit for CN 2k/xp/2003 bypass version
>>
>>
>>
>> Ru ti!
>>
>>
>>
>>
>>
>>
>>
>>
>>
> >
>


-- 
Life with Linux

--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

<<inline: image001.gif>>

回复