what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 107 RSS Feed

Files

webramp-M3.txt
Posted Aug 17, 1999

WebRamp M3 remote network access bug allows remote attacker to easily connect to the router via telnet; default admin password poses additional security risks.

tags | exploit, remote
SHA-256 | a2c726967e60574c477b6699f93e662a5cf819223fc5a80c12dabbea848a75f0
95replay.txt
Posted Aug 17, 1999
Authored by weld

Windows 95/98 Network File Sharing Security Hole - Sniffed authentications can be used to impersonate network users and establish valid connections, giving a malicious attacker the opportunity to easily read and write files from/to Win95/98 machines.

tags | exploit
systems | windows
SHA-256 | b62fc3f0ff04182ab1cfdcc946980620cc6a9487192cd7fee5fbbfff1d493001
against.c
Posted Aug 17, 1999

Sendmail 8.9.2 Denial of Service exploit code.

tags | exploit, denial of service
SHA-256 | 94909bd0dc366bd42f8c781b305c85ac38cce1c99b9811467f3d2efef15067f9
ath0-2.sh
Posted Aug 17, 1999
Authored by Nelson R A Brito

Another script that exploits and/or patches Unix boxes using modems susceptible to the "+++ATH0" modem-based DoS attack as described here.

tags | exploit
systems | unix
SHA-256 | d9df9b89af71ad4c2649368718ecaa47d0e918615f6d93495f21697cc5223c9c
automountd.tar.gz
Posted Aug 17, 1999

SUN Solaris 2.5, 2.5.1, 2.6, 2.7 (X86 and SPARC architectures) Automountd vulnerability - remote exploit of automountd with updated code that allows malicious remote user to execute ANY program on any default installation of SUN. Incorporation of new rpc.statd into exploit code allows remote user to utilize the TLI protocol to spoof RPC packets at DNS level. Read the cop-01.txt automountd/rpc.statd exploit whitepaper for more details.

tags | exploit, remote, x86, spoof, protocol
systems | solaris
SHA-256 | ba82eabeee22b98ef98e11f045d2987f1037c80446ba3348f27b53fffe4d9ebd
backweb-spoof.txt
Posted Aug 17, 1999

Vulnerability in the BackWeb Polite Agent Protocol allows malicious attacker to "spoof" BackWeb server.

tags | exploit, spoof, protocol
SHA-256 | ef49cc707136bd5046b43d27c34f92f4f0f68856ba4fe17e79d9b2d74fc37cbe
beace.tar.gz
Posted Aug 17, 1999

beace - socks 5 irc clone loader that loads a variable number of clones through different socks servers onto different irc servers, then executes a predefined script. It also hides the hostmask from lame mirc users using color codes.

tags | exploit
SHA-256 | 1001c5dd92d928835cd9ebd778507adfb69730b4ff71b0643cbef45265188bc8
bigfoot-bellsouth-webmail.txt
Posted Aug 17, 1999

Bigfoot/Bellsouth Webmail bug allows malicious users to exploit cached pages to access accounts of other users.

tags | exploit
SHA-256 | bde6766f3ce84cac4ba43126682e793feeb088c8d5295dd62f7ea5da219cdaf4
CGIc-DoS.txt
Posted Aug 17, 1999

CGIc Library is vulnerable to buffer overflow allowing remote attacker to get root access.

tags | exploit, remote, denial of service, overflow, root
SHA-256 | 10d8fe82114e5c569b2fda157292f8c2fe2680c172d99c2c8a564211ef3d01b5
cisco-ios-DoS.alert.txt
Posted Aug 17, 1999

Cisco Security Notice: Cisco IOS Syslog Crash - Certain versions of Cisco IOS software may crash or hang when they receive invalid user datagram protocol (UDP) packets sent to their "syslog" ports (port 514), from tools such as the latest nmap scanner. This severe DoS attack can completely shut down Cisco IOS products and force manual physical reset.

tags | exploit, udp, protocol
systems | cisco
SHA-256 | 84d53454ce9ad5b065a3bc256cbb42fb3fcbf37a71204c411d2134abb935d2f8
cisco-ios-identification.txt
Posted Aug 17, 1999
Authored by JoeJ

Details about how easy it is to remotely identify Cisco products running IOS code.

tags | exploit
systems | cisco
SHA-256 | e74ad135d52bf8d21854f8625d05d7c1becc82ed522a986af2fb8778e32ae6e9
cop-01.txt
Posted Aug 17, 1999

Description of the Sun 2.x automountd/rpc.statd exploit remote program execution exploit.

tags | exploit, remote
SHA-256 | d7d48d6fd6aaf0b4e2f6b400db2c49e5b480d4068af05c6149e46d51fb638639
dpec-course-passwds.txt
Posted Aug 17, 1999

DPEC's (www.dpec.com) Online Courseware has a nasty bug in it that allows anyone to change anyone elses password without knowing what their current password is (including admin accounts!).

tags | exploit
SHA-256 | 62e915c7eff3282dd1eb84b7f090cb26d629fe5fcd3d33f310e95bb6715af430
either.exe
Posted Aug 17, 1999

As a followup to the L0pht Heavy Industries, we have a program designed to ease the modification of MAC addresses in Windows environments.

tags | exploit
systems | windows
SHA-256 | 16a96e9c7c4f6855f3f4a4146be95d8926fe170206dde0a3e6760132f71c6083
elf-pv.txt
Posted Aug 17, 1999
Authored by Silvio Cesare

An article on UNIX ELF PARASITES AND VIRUSES including a fully working parasite infector and binary virus for Linux (UNIX portable however). The parasites and virus described and given do not destroy the executeables functionality but instead as with many DOS viruses simply append new code to the image. Rudimentary techniques for disabling the parasites and virus is also described. (includes LONG rant at beginning by author).

tags | exploit, virus
systems | linux, unix
SHA-256 | 41101f0b3c5ca938f20c81b9751270536b75203824557fe9301873ac62f7da1e
ff.core.sh
Posted Aug 17, 1999

ff.core local root exploit for Solaris 2.5.1 and 2.6.

tags | exploit, local, root
systems | solaris
SHA-256 | 17d2d3eae48ebb4c573b3fda1d608f181dca9d70d743779d859173af025a5053
ftpwatch.txt
Posted Aug 17, 1999

Major security problems in Debian distributions (1.3 and later) of the ftpwatch package allow simple root access.

tags | exploit, root
systems | linux, debian
SHA-256 | e5df69e725ae9e4fcc4443d44dfc95654cb9f1545510b0197596c3e97fadb8ad
GetadmforSops.txt
Posted Aug 17, 1999
Authored by David Litchfield

Default permissions on Registry key creates a getadmin hole - security hole in the winlogon registry key on NT 4 (with all SPs) allows elevation of privileges to both local and global Administrator level. Local root compromise. VC++ exploit code included.

tags | exploit, local, root, registry
SHA-256 | a8f21acd06a3b712d83d19cf99ec80079e3c13dce4672a42907c8d14af1f2bca
http-request_method.txt
Posted Aug 17, 1999

HTTP REQUEST_METHOD flaw allows for stealth and/or spoofed attacks on web servers.

tags | exploit, web, spoof
SHA-256 | b4799c31790ebda709aa482851eba24c210dd04d38d678f56d727a7ea1975ab4
iis4.0+visual-interdev.txt
Posted Aug 17, 1999

Using Visual Interdev 6.0, remote attacker can connect to IIS 4.0 Servers without being asked for any security passwords, and make changes to remote server files without being logged at all.

tags | exploit, remote
SHA-256 | 28b3d8ae3298a8a7503838c7f214c4e520c73eba9458918bf02d83d9587c676b
iomega-onestep-backup.txt
Posted Aug 17, 1999

Iomega One-Step Backup software "security tab" uses VERY weak encryption.

tags | exploit
SHA-256 | 19eed9b5096f8df82ab2c5c353cc39c01981ecc6e621c2e824fa3b892524a99f
killport.c
Posted Aug 17, 1999

Exploit code for Linux 2.0.36 - local port/memory DoS attack.

tags | exploit, local
systems | linux
SHA-256 | c6d540e7c839d455881d48be9058dbb2d3501dbdd501ae0dfa9572ed941f3e20
l0pht-watch.tar.gz
Posted Aug 17, 1999
Authored by mudge@l0pht.com

A tool designed to monitor directory activity, copy transient files based upon regular expression matching, syslog upon seeing links created, etc. etc.

tags | exploit
SHA-256 | 009d0caa417af9984853ed35b338892c7e71f91002af3a6f3002f7c09c443272
livingston-PM3-DoS.txt
Posted Aug 17, 1999

Livingston PM3 DoS attack.

tags | exploit
SHA-256 | 38b30f09114c09ae5bbbcfaf35d0114eb19bb8deb2a08e122383a8b949bc4d6a
lotus-notes-smtp-DoS.txt
Posted Aug 17, 1999

Denial of Service attack exists in Lotus Notes SMTP Server.

tags | exploit, denial of service
SHA-256 | 89034d5718d66dedf6d9589d6504402105ccc01d6199fb45b49e839e5db470d6
Page 3 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Sam Bankman-Fried's Sentencing Hearing Over FTX Fraud Begins Today
Posted Mar 28, 2024

tags | headline, fraud, cryptography
Sellafield To Be Prosecuted For IT Security Offenses
Posted Mar 28, 2024

tags | headline, government, britain, flaw
These 17,000 Microsoft Exchange Servers Are A Ticking Time Bomb
Posted Mar 28, 2024

tags | headline, microsoft, email, flaw
Analyse, Hunt, And Classify Malware Using .NET Metadata
Posted Mar 27, 2024

tags | headline, hacker, malware, microsoft
VPN Apps On Google Play Turn Android Devices Into Proxies
Posted Mar 27, 2024

tags | headline, privacy, phone, flaw, google
Fortinet FortiClient EMS SQL Injection Flaw Exploited In The Wild
Posted Mar 27, 2024

tags | headline, hacker, flaw
Google Reveals 0-Day Exploits In Enterprise Tech Surged 64% Last Year
Posted Mar 27, 2024

tags | headline, flaw, google, zero day
Ray AI Framework Vulnerability Exploited To Hack Hundreds Of Clusters
Posted Mar 27, 2024

tags | headline, hacker, flaw
Justice Dept Indicts 7 Accused In 14 Year Long Hack Campaign By Chinese Government
Posted Mar 26, 2024

tags | headline, hacker, government, usa, china, cyberwar, spyware, backdoor
Ransomware Can Mean Life Or Death At Hospital, But DEF CON Hackers Have A Plan
Posted Mar 26, 2024

tags | headline, hacker, malware, conference, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close