Results 1 to 10 of 10

Thread: Video smb_replay exploit

  1. #1
    Just burned his ISO
    Join Date
    Jul 2006
    Posts
    13

    Default Video smb_replay exploit

    Hi all,

    Been a bit of talk about this exploit so I made a quick video I am no pro and any feed back would be great.

    http://blip.tv/file/784326

    Thanks,

    wrono

  2. #2
    Junior Member unix_r00ter's Avatar
    Join Date
    Feb 2007
    Posts
    64

    Default

    really nice video keep up the good work 10/10

  3. #3
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    14

    Default

    Quote Originally Posted by wrono View Post
    Hi all,

    Been a bit of talk about this exploit so I made a quick video I am no pro and any feed back would be great.

    Thanks,

    wrono
    nice videos

  4. #4

  5. #5
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default

    You did a good job wrono nice video.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

  6. #6

    Default

    Quote Originally Posted by wrono View Post
    Hi all,

    Been a bit of talk about this exploit so I made a quick video I am no pro and any feed back would be great.

    http://blip.tv/file/784326

    Thanks,

    wrono
    nice video & cheers for uploading
    your other video is also good aswell

  7. #7
    Just burned his ISO
    Join Date
    Jul 2006
    Posts
    13

    Default Thank you all for the nice words.

    Hi,

    Thanks for watching and for all the feed back been great will make some more videos soon.

    wrono

  8. #8
    Member
    Join Date
    Jun 2006
    Posts
    107

    Default

    Dears,

    I have a question on how this exploit works. As I understood, is that once the victim tries to browse the page, lets say google.com, he will be redirected to a similar page hosted at the attacker side, we put a link to a share within this page, so once the victim browses it, he will be accessing this share, and a pop-up window will as him to put his credintials, and he will do this by default.

    My question is once he entered his real credintials, does this allow the exploit to create the payload that was specified in the attack ?

    Thanks,

  9. #9
    Just burned his ISO
    Join Date
    Mar 2008
    Posts
    9

    Default

    thanks for the tutorial it works

    BTW how does it work in mozilla? i only manage to make it work in IE

  10. #10
    Junior Member
    Join Date
    Aug 2007
    Posts
    85

    Default

    Thanks for the Vid
    How you spend your time is more important than how you spend your money. Money mistakes can be corrected, but time is gone forever. David Norris

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •