--=0---=0---=0---=0---=0---=0---=0---=0
POWERED by Linux eXtreme V1.1
--=0---=0---=0---=0---=0---=0---=0---=0
RaZa MeXiCaNa TeAm w w w . r a z a - m e x i c a n a . o r g
------------------------------------------------------------------
|D3VIL OF THE NET | - | THE FINAL DAY IS HERE|
-----BEGIN PGP MESSAGE-----
Version: 2.6.3i
owGtkcFKw0AQhsWT7FP8L5BcvAmCId2SQLKWGCT2YNl2x7La3YVNxFb6Sr6jY0C0
J0HyDf/h/2dght2P8+f1hYmrJ2P7lzMGv0iY6z/5mhI4pUGGJQuoIdGhRM5OjQla
jjLU4p+rhNKOrvB99COEdNrufpKbtQ39oU89DaIIjhZ6y/M+CJFMichDiMZ6bUKE
oR0WMRxoMwRU1r/uQd0QyZFo9FKjps7mWmm0lDngbawUERrvrAQOhD0sNuw8K0Xg
7naCk0//ZnZ5X1a4naMtJJRsceTlx9HNS5VVmGUPKO9QyEZO+14Qnw==
=An72
-----END PGP MESSAGE-----
--------------63FC237A4CB8A83445A20326
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
HI sorry,,, a person posts this exploit made for WIn32....
i coded the same exploit, but it's compile in UNIX ,,,
c-u
thx
-- ----------------------------------------------------------------------------- --=0---=0---=0---=0---=0---=0---=0---=0 POWERED by Linux eXtreme V1.1 --=0---=0---=0---=0---=0---=0---=0---=0 RaZa MeXiCaNa TeAm w w w . r a z a - m e x i c a n a . o r g ------------------------------------------------------------------ |D3VIL OF THE NET | - | THE FINAL DAY IS HERE| -----BEGIN PGP MESSAGE----- Version: 2.6.3i owGtkcFKw0AQhsWT7FP8L5BcvAmCId2SQLKWGCT2YNl2x7La3YVNxFb6Sr6jY0C0 J0HyDf/h/2dght2P8+f1hYmrJ2P7lzMGv0iY6z/5mhI4pUGGJQuoIdGhRM5OjQla jjLU4p+rhNKOrvB99COEdNrufpKbtQ39oU89DaIIjhZ6y/M+CJFMichDiMZ6bUKE oR0WMRxoMwRU1r/uQd0QyZFo9FKjps7mWmm0lDngbawUERrvrAQOhD0sNuw8K0Xg 7naCk0//ZnZ5X1a4naMtJJRsceTlx9HNS5VVmGUPKO9QyEZO+14Qnw== =An72 -----END PGP MESSAGE-------------------63FC237A4CB8A83445A20326-- --------------B105FA723A5B39CE8CFB14A1 Content-Type: text/plain; charset=us-ascii; name="inetserv-exp.c" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="inetserv-exp.c" /********************************************************************** InetServ 3.0 (Windows NT) REMOTE EXPLOIT CODEd by dr_fdisk^ *********************************************************************** CLASE: DENIAL OF SERVICE BUG/SHELLCODE FOUND by: Greg Hoglund ))))))))))))(((((((((((( )))RaZa MeXiCaNa TeAm((( ))))))))))))(((((((((((( w w w . r a z a - m e x i c a n a . o r g (((((((((((((((((((((((((((((((((((((((((( ************************************************************************ Aclaracion: el exploit lo programe porque lo necesitaba usar bajo Unix y no en entorno Windows como fue presentado. ************************************************************************/ /*********************************************************************** -----BEGIN PGP MESSAGE----- Version: 2.6.3i owGtkMFKw0AQhtXjPsX3AimIN9HDkm5pIIkSg8QeKmt3lUWThbVilb6S7+iYkz0J km/4D//MwAz/18nFw/HpkcAvMuHyT362FIc0aFYiqDB0FOTi6rFDKy1Npf55StW2 9+e4dP/owuvzGqWyKVF5jMmFwbqYcP6F6xQ//GYbKcPwtsN32+R7rxq7slS+C7mt La3XPbyPNSNh+RRl9Hh2BDbiBtGMKNOnCV4+zHx+dluUXC1ol4batOzl+H50i6LW JXN9R3HD0jRm2rwk/28= =92LB -----END PGP MESSAGE----- ************************************************************************/ /*------------------------------* * DEFINIR EL PUERTO DEFAULT */ /*------------------------------*/ #define PUERTO 224 #include