Re: DCOM RPC exploit (dcom.c)

From: sk@scan-associates.net
Date: Mon Jul 28 2003 - 20:50:49 PDT

  • Next message: Mike Kristovich: "GameSpy Arcade Arbitrary File Writing Vulnerability"

    
     ('binary' encoding is not supported, stored as-is)
    In-Reply-To: <20030727025321.64988.qmailat_private>
    
    >One glitch is that the exploitation is not very
    >stealth. All RPC/COM based functions stop working
    >completely after exploitation and fail to heal until
    >the machine is restarted. Many of these functions are
    >quite visible and easily noticeable(drag&drop,
    >clipboard, property sheets, etc., for example). This
    >happens without exception.
    
    If the shellcode exit via ExitThread(), RPCSS will not die, everything 
    rock as usual, and you can run the exploit over and over again.
    
    sk
    



    This archive was generated by hypermail 2b30 : Wed Jul 30 2003 - 10:50:03 PDT