2008/10/27 kelzz <[EMAIL PROTECTED]> > 测试了4台,没成功,呵呵,人品问题吧。 > > > 2008-10-27 > ------------------------------ > kelzz > ------------------------------ > *发件人:* 54netkey > *发送时间:* 2008-10-27 10:25:45 > *收件人:* ph4nt0m > *抄送:* > *主题:* [Ph4nt0m] Re: > [Ph4nt0m]_回复:[Ph4nt0m]_Re:_答复:_[Ph4nt0m]_MS08-067_Exploit_for_CN_2k/xp/2003_bypass_version > > 没成功过。 > C:\>MS08-067.exe 192.168.0.109 > MS08-067 Exploit for CN by [EMAIL PROTECTED] > SMB Connect OK! > RpcExceptionCode() = 1722 > > 2008-10-27 > ------------------------------ > 54netkey > ------------------------------ > *发件人:* 黑星 > *发送时间:* 2008-10-27 09:51:03 > *收件人:* ph4nt0m > *抄送:* > *主题:*[Ph4nt0m]_回复:[Ph4nt0m]_Re:_答复:_[Ph4nt0m]_MS08-067_Exploit_for_CN_2k/xp/2003_bypass_version > > 不知道绑定的是哪个端口呢? > > > > > > > 在2008-10-27 04:14:53,ring04h <[EMAIL PROTECTED]> 写道: > > 顶起,可爱的 win32_bind > > 2008/10/27 大风 <[EMAIL PROTECTED]> > >> >> >> 顶啊,全球首个可用的exp,成功率很不错哦! >> >> >> >> 顶EMM! >> >> >> >> >> >> *[Ph4nt0m] <http://www.ph4nt0m.org/> * >> >> *[Ph4nt0m Security Team]* >> >> * [EMAIL PROTECTED] <http://blog.ph4nt0m.org/>* >> >> * Email: [EMAIL PROTECTED] >> >> * PingMe: >> <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wuhq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724> >> * >> >> * **=== V3ry G00d, V3ry Str0ng ===*** >> >> * === Ultim4te H4cking ===* >> >> * === XPLOITZ ! ===* >> >> * === #_# ===* >> >> *#If you brave,there is nothing you cannot achieve.#* >> >> >> ------------------------------ >> >> *发件人:* [email protected] [mailto:[EMAIL PROTECTED] *代表 * >> EMM >> *发送时间:* 2008年10月27日 1:46 >> *收件人:* [email protected] >> *主题:* [Ph4nt0m] MS08-067 Exploit for CN 2k/xp/2003 bypass version >> >> >> >> Ru ti! >> >> >> >> >> 局域网试验两台 成功一台~~~ >> >> >> > >
--~--~---------~--~----~------------~-------~--~----~ 要向邮件组发送邮件,请发到 [email protected] 要退订此邮件,请发邮件至 [EMAIL PROTECTED] -~----------~----~----~----~------~----~------~--~---
<<inline: 25.gif>>
<<inline: image001(10-27-09-58-26).gif>>

