For mods, please, stick this thread - this is going to be interesting.
=========================================
SRO Blitzkrieq -> Beginning
So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.
The IP address is pretty well known to everyone out here.
Code:
123.30.200.70
You may try pinging it, to ensure it's up.
cmd -> ping 123.30.200.70
Well, let's see what we got there ?
Let's trace route.
Code:
cmd -> tracert 123.30.200.70
Code:
7 277 ms 276 ms 276 ms 80.156.161.62 8 303 ms 304 ms 303 ms 203.162.217.25 9 304 ms 304 ms 303 ms static.vdc.vn [222.255.165.33] 10 313 ms 313 ms 313 ms 203.162.231.9 11 318 ms 318 ms 319 ms static.vdc.vn [123.30.63.26] 12 313 ms 313 ms 313 ms static.vdc.vn [123.30.63.66] 13 314 ms 314 ms 313 ms dynamic.vdc.vn [123.30.200.254] 14 313 ms 313 ms 313 ms dynamic.vdc.vn [123.30.200.70] Trace complete.
Let's scan the "closest" machines to our target. (i'd preffer NMAP)
Code:
nmap -T4 -A -v 123.30.200.0-255
Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...
=========================================
More hints comes shortly.
=========================================
Blitzkrieq -> Part 2
HINT :
Code:
ms netapi 067 ms 09_004_sp_replwritetovarbin
==========================================







