Summary of lab testing:
Supposedly this attack is supposed to work against ALL NT 4.0 service
packs. In lab testing however, it actually didn’t do anything noticeable to the
Service Pack 3 (default) Enterprise Server 4.0 installation. However, once SP6a
was installed, the system would crash and blue screen within less than five
seconds from when attack began. This was consistently repeatable on multiple
installations on different machines.
How to use the exploit:
This attack requires ipsend, also available as part of the ipfilter firewall product. I
was not able to get ipsend to compile on Linux, but it compiled and functioned
fine on Solaris 8 and FreeBSD.
Simply point the attack script to the victim IP, and the system will blue screen
within 5 seconds (depending on system and connection speeds of course).
Do'stlaringiz bilan baham: |