 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 315
Members: 0
Total: 315
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
How to exploit this milworm code? |
 |
Posted: Thu Jul 31, 2008 6:45 am |
|
|
abc |
Beginner |

 |
|
Joined: Jul 31, 2008 |
Posts: 2 |
|
|
|
 |
 |
 |
|
|
|
|
|
 |
Re: How to exploit this milworm code? |
 |
Posted: Thu Jul 31, 2008 12:35 pm |
|
|
x3roconf_ |
Advanced user |

 |
|
Joined: May 01, 2008 |
Posts: 101 |
|
|
|
 |
 |
 |
|
You need a perl interpreter to run that exploit. I suggest that you install Linux(like Ubuntu) because it has a perl interpreter. After you have installed Linux you need give execute permission to the script chmod +x script.pl) and then you can use it like this: usage: ./csdos.pl 127.0.0.1 (or you can simply give this command (no need for cmod +x) perl csdos.pl 127.0.0.1 <-- target
Hope this helps!
 |
|
|
|
|
Posted: Thu Jul 31, 2008 1:14 pm |
|
|
gibbocool |
Advanced user |

 |
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
 |
 |
 |
|
You can run it on any machine. just download Perl and execute it from the command prompt.
The host is the IP of the target machine. |
|
|
|
|
Posted: Thu Jul 31, 2008 1:50 pm |
|
|
lenny |
Valuable expert |

 |
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
 |
 |
 |
|
You know, if you cannot figure out how to use a simple perl exploit then you probably shouldnt be using the exploit in the first place. Thats my 2 cents. |
|
|
|
|
Posted: Thu Jul 31, 2008 2:52 pm |
|
|
x3roconf_ |
Advanced user |

 |
|
Joined: May 01, 2008 |
Posts: 101 |
|
|
|
 |
 |
 |
|
lenny wrote: | You know, if you cannot figure out how to use a simple perl exploit then you probably shouldnt be using the exploit in the first place. Thats my 2 cents. |
True.  |
|
|
|
|
Posted: Fri Aug 01, 2008 2:02 am |
|
|
ABCD |
Beginner |

 |
|
Joined: Aug 01, 2008 |
Posts: 2 |
|
|
|
 |
 |
 |
|
Well i did exactly what you said but... I got this "9LAN servers are restricted to local clients <class C>"
Sorry im hella new to this stuff and want to try this out  |
|
|
|
|
Posted: Fri Aug 01, 2008 11:53 am |
|
|
lenny |
Valuable expert |

 |
|
Joined: May 15, 2008 |
Posts: 275 |
|
|
|
 |
 |
 |
|
What exactly is the purpose of the exploit? Dosen't sound legit to me...
From what I have found out, apparently that error message is the result of trying to join a LAN-only game but is being managed (via heartbeat) by the master servers at steam. Looks like your target isn't vulnerable until it becomes open for online play. |
|
|
|
|
Posted: Fri Aug 01, 2008 8:15 pm |
|
|
ABCD |
Beginner |

 |
|
Joined: Aug 01, 2008 |
Posts: 2 |
|
|
|
 |
 |
 |
|
weird.... because i can play on the server and its a europe server... well thanks anyways  |
|
|
|
|
Posted: Sat Aug 02, 2008 12:05 am |
|
|
abc |
Beginner |

 |
|
Joined: Jul 31, 2008 |
Posts: 2 |
|
|
|
 |
 |
 |
|
ohhh! thank you very much! this script isnt really legit. its shuts down the server of the target machine. |
|
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|