Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Windows-> Scanners » MS05-051 Scan v1.0

This Directory TOP
Legion v.2.1
SuperScan v4.0
NMapWin 1.3.1
ipEye 1.2
DDoSPing v2.0
SQLScan v1.00
Xnsscan v0.22
MessengerScan v1.05
Top 15 free SQL Injection Scanners
Angry IP Scanner 3.0 beta 3
RPCScan v2.03
DSScan v1.00
Acunetix Web Vulnerability Scanner 8.0.20120613
MS05-051 Scan v1.0
Windows Vulnerability Scanner 1.48
AdminLoginFinder
NetSchedScan v1.0
NEWT Professional 2.5.226
Free IP Scanner 1.1
AVG LinkScanner 2012 12.0 Build 1873a4623
MS05-039 Scan v1.0
BOping v2.0
SNScan v1.05
A Review of Fingerprint Scanners
WebCruiser - Web Vulnerability Scanner 2.5.0
openAcunetix 2.04
WordPress Security Scanner
Scanner NessusWX 1.4.4 Win32
NmapW 2.0
Javascript LAN Scanner
Nessquik v2.5 - a Web-based Nessus Scanner
Paketto Keiretsu
Search

MS05-051 Scan v1.0

File Size: 54KB
Developer: http://www.foundstone.com
Description:     MS05-051 Scan 1.0 is a Windows based detection and analysis utility that can quickly and accurately identify Microsoft operating systems that are vulnerable to the vulnerabilities released in the MS05-051 bulletin.

MS05-051 Scan is intended for use by enterprise system and network administrators as a fast and reliable utility for identifying at risk Microsoft systems in a passive manner. This tool is non-abrasive in nature and may be run in production environments during production hours.

Limitations of the tool:
The scanner is limited to 10 outgoing connections on WIndows XP SP2. This scanning limitation is caused by SP2. All other platforms will have 64 concurrent scanning threads running.

If you have anti-virus running it *may* detect this tool as an exploit. This tool *does NOT* exploit the vulnerabilty it simply determines if the machine is vulnerable or not.

Vulnerability Information:
A remote code execution and local elevation of privilege vulnerability exists in the Microsoft Distributed Transaction Coordinator that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.

Using a null session, an attacker could make an RPC request to the DTC interface on a Microsoft Windows system and potentially execute arbitrary code.

This Foundstone check detects the absence of the patch by attempting to trigger the vulnerability in a nonintrusive manner over RPC.

Affected systems:

Microsoft Windows 2000 (All Versions)
Download:   MS05-051 Scan v1.0

 

Sponsor Links

Sponsor Links

Share/Bookmark