ïw¤ÎBlog

来源: BlogBus 原始链接: http://www.blogbus.com:80/blogbus/blog/index.php?blogid=16980&pg=9&cat= 存档链接: https://web.archive.org/web/20041124031626id_/http://www.blogbus.com:80/blogbus/blog/index.php?blogid=16980&pg=9&cat=


ïw¤ÎBlog ÃΣ¬·ÉÆðµÄµØ·½ diary (33) article (45) exploit (57) 2004 Äê 11 Ô Sun Mon Tue Wen Thu Fri Sat 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ×îÐÂÎÄÕ SLmail 5.x POP3 Remote Pass Buffer Overflow Exploit Apache <= 2.0.52 HTTP GET Remote Denial of Service Exploit Ç÷ÊÆ¿Æ¼¼½«·¢²¼Ð¿îÇ÷ÊÆ¿Æ¼¼ÍøÂ粡¶¾Ç½ VeriSign³Æ£º90%ÍøÂç¹¥»÷À´×ÔÃÀ¹ú¿í´øÓû§ UBB.Threads 6.2.-6.3. one char bruteforce Exploit Multiple Antivirus Products Virus Detection Bypass PoC Exploit Eudora 6.2 Remote Attachment Spoofing Proof of Concept IPSwitch-IMail 8.13 Delete Command stack overflow Exploit Kerio Personal Firewall Multiple IP Options Denial of Service PoC NetNote Server v2.2 build 230 ×îÐÂÆÀÂÛ ¹Â¹â½£Òþ : Ö÷°åÏÔ¿¨»úÏä»»¡£. ¹Â¹â½£Òþ : ºÇºÇ¡£¡£B4½­Ãñ£¬. alvashev : ͬÀÖͬÀÖ . Á´½Ó 56TECH ÄÏÒþÊÀ¼Ò ÷ÁÖÐ¡í¬ ÍøÂç¼¼ÊõÁªÃË °µµØÇ±Á÷ ´æµµ 2004/05/31/-2004/05/31 2004/06/01/-2004/06/04 2004/06/05/-2004/06/28 2004/06/29/-2004/10/27 2004/10/28/-2004/11/05 2004/11/06/-2004/11/13 2004-10-24 11:37 - [ diary ] AMD Sempron 2600+ S462 0.13 333mhz 665½ðÊ¿¶Ù KVR400X64C3 256M/DDR400 3452Î÷²¿Êý¾Ý WD800JB 80m/8m ata 525Ë«Ãô »ðÐý·ç9518 ATI RADEON 9550/128M 550Ë«Ãô UN400TR nVIDIA nForce2 Ultra400 740ÈýÐÇ 795MB 1260 /·ÉÀûÆÖ 150S5 2399¼¼Õ¹ ATX-6102 270ÏÈ·æ DVD-121SA 290ÂÞ¼¼ ¹âµç¸ßÊÖ¼üÅÌÊó±êÌ××° 150AVC Z090Z63¾¢Àäսʿ 70&nbs.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(1) | ÒýÓÃ(0) bamb00 @ 2004-10-24 11:37 | ±à¼­ 2004-10-21 10:53 - [ exploit ] /******************************************************************************** local exploit for mod_include of apache 1.3.x * written by xCrZx /18.10.2004/ * bug found by xCrZx /18.10.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-10-21 10:53 | ±à¼­ 2004-10-20 11:34 - [ article ] 10ÔÂ20ÈÕ£¬ ÈëÇÖ½­Ãñ¿Æ¼¼ÍøÕ¾·þÎñÆ÷µÄºÚ¿Í¡°ºÓÂíÊ·Ê«¡±£¬ÆÈÓÚ¾Þ´óµÄ˼ÏëѹÁ¦Ö÷¶¯×ß½øÉòÑôÊй«°²¾ÖͶ°¸×ÔÊס£¼ÇÕß´Ó½­ÃñпƼ¼ÊõÓÐÏÞ¹«Ë¾Ö¤ÊµÁËÕâÒ»ÏûÏ¢£¬ºÚ¿Í¡°ºÓÂíÊ·Ê«¡±ÊÇÔÚ½­Ãñ¼¼ÉòÑô°ìÊ´¦ÈËÔ±µÄÖ¸µãÏÂÈ¥ÉòÑôÊй«°²¾ÖÍøÂ簲ȫ¼à²ì´¦Í¶°¸×ÔÊ׵ġ£ 10ÔÂ17ÈÕ£¬°üÀ¨ÉñÖÝÊýÂ롢ijÃÅ»§ÍøÕ¾¡¢XXXÓÎÏ·ÓéÀÖÓÐÏÞ¹«Ë¾¡¢Ò»¼ÒÖøÃûµç×ÓÉÌÎñÍøÕ¾¡¢½­Ãñ¿Æ¼¼µÈÒ»ÅúÍøÕ¾Ôâµ½ºÚ¿ÍÈëÇÖ£¬ÆäÖкڿÍÔÚ½­.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(1) | ÒýÓÃ(0) bamb00 @ 2004-10-20 11:34 | ±à¼­ 2004-10-20 10:52 - [ exploit ] #!/usr/bin/perl# IIS BlowOut # POC exploit for MS04-030. Found by Amit Klein. # incognito_ergo yahoo com# usage: perl ms04-030_spl.pl host portuse IO::Socket;$port = @ARGV[1];$host = @ARGV[0];$socket = IO::Socket::INET->new(PeerAddr => $host,PeerPort => $port,Proto => "TCP");for ($count=1; $count<9999; $count++) #more.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-10-20 10:52 | ±à¼­ 2004-10-19 17:48 - [ diary ] ·½Ô°ÍøÔÚÏß·­Òëhttp://www.fy-wt.com/fanyi/½ðÇÅÊÀ½çͨhttp://www.netat.net/ .............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-10-19 17:48 | ±à¼­ 2004-10-18 21:44 - [ article ] ¡¡¡¡×îÐÂÑо¿Ö¤Ã÷°®Òò˹̹¡°¹ãÒåÏà¶ÔÂÛ¡± ¡¡¡¡Ð¿챨Ѷ¡¡ÃÀ¹úÌ«¿Õ×ÜÊð10ÔÂ21ÈÕ±íʾ£¬¿ÆÑ§¼Ò¼°´óѧÑо¿Ô±Ê×´Î׼ȷ·¢ÏÖ£¬ÈËÔìÎÀÐÇÎ§ÈÆµØÇòת¶¯Ê±»á±»Ð©Î¢ÍÏÀëÔ­ÓеĹìµÀ£¬´Ë½á¹û֤ʵÁ˵ØÇòת¶¯»áÁîÖÜÔâµÄʱ¼ä.............. ÔĶÁÈ«ÎÄ | ÆÀÂÛ(0) | ÒýÓÃ(0) bamb00 @ 2004-10-18 21:44 | ±à¼­ ·ÖÒ³: µÚÒ»Ò³ [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] ×îºóÒ³ Ä£°åÉè¼Æ£º zhou