the original cloud security
Showing 1 - 25 of 122 RSS Feed

Files

Backdoor.c
Posted Aug 17, 1999
Authored by PBBSER

A basic backdoor program, but with a couple of neat features that "secure" the backdoor from being widely misused.

tags | exploit
MD5 | b5a5a5086575a9ed0afcdcd30a3641b9
pop2d.imap.txt
Posted Aug 17, 1999

Security hole in the pop2 daemon packaged with imap-4.4 and earlier releases allows remote attacker to gain shell access as user 'nobody'. Solution: Upgrade to imap-4.5.

tags | exploit, remote, shell, imap
MD5 | 79c0282423763209c154065bcd97cc33
procfs.solaris.time.c
Posted Aug 17, 1999

Proof of concept exploit code that effectively demonstrates how the time() system call can be faked via procfs on Solaris. Numerous security implications.

tags | exploit, proof of concept
systems | solaris
MD5 | 1a1e4eb29fe02e777a84e46b7ff2c37e
quickie.c
Posted Aug 17, 1999
Authored by Bronc Buster

Another Coldfusion exploit scanner, but this version scans entire subnets and is much faster than other Coldfusion exploit scanners. Excellent platform portability and clean, fresh code.

tags | exploit
MD5 | f948214d64d7f6e085632b4bed8df2a0
rasbo.htm
Posted Aug 17, 1999
Authored by David Litchfield

"Exploiting Windows NT 4 Buffer Overruns - A Case Study: RASMAN.EXE" - excellent paper that details how to exploit Windows NT buffer overflows. Proof of concept exploit code and step-by-step exploit instructions included.

tags | exploit, overflow, proof of concept
systems | windows, nt
MD5 | d06653c20673cde252e3250d1f4f7fc6
rollover.c
Posted Aug 17, 1999

Simple, but useful, code snippet that uses ptrace() to intercept and modify the return value of a system call.

tags | exploit
MD5 | 4084b43ee9c23292a4328e4c36d4c6f5
sans.sec-v3n5.txt
Posted Aug 17, 1999

May SANS Security Digest Vol.3 Num.5 - the latest issue of the excellent, comprehensive SANS Security Digest, with information regarding Intrusion Detections and security issues and general info for all major operating systems. SANS

tags | exploit
MD5 | d93aaea84a837651d56f02e6fa9aeea9
shock-1.2.zip
Posted Aug 17, 1999
Authored by Xhostile

Shockwave v1.2 sends random data to random ports on a remote host at a very fast rate, disconnecting targeted remote hosts from ICQ/IRC servers, lagging remote machines, rendering dialup connections useless.

Changes: Added the ability to see what ports are being hit, re-did the packet sending code and changed the configuration UI.
tags | exploit, remote
MD5 | 1c511b0711db6311e7bc539119931976
shockwave.zip
Posted Aug 17, 1999
Authored by Xhostile

Shockwave v1.1 is a Denial of Service program that sends random data to random ports on a remote host at a very fast rate. For Windows.

tags | exploit, remote, denial of service
systems | windows
MD5 | d8f37a91d79c756126285ff30b1278ae
showcode.tar.gz
Posted Aug 17, 1999
Authored by Jack Smiley

showcode is a vulnerability scanner that checks for the Microsoft IIS 4.0 showcode.asp vulnerability. Optionally scans entire subnets.

tags | exploit, asp
MD5 | f8b9721b5a5a52c7ed94583928b93e51
solaris.5.7.mount.suid.txt
Posted Aug 17, 1999

Description of SunOS 5.7 rmmount exploit that allows local user to gain root privileges.

tags | exploit, local, root
systems | solaris
MD5 | cbec665a86fc079b2ea632e1723375ec
sshd.install.risks.txt
Posted Aug 17, 1999

When installed under certain common conditions, a security bug in sshd allows any user to easily gain root access.

tags | exploit, root
MD5 | cd05935606507c660befa6108638a626
sun-snmp.txt
Posted Aug 17, 1999
Authored by Jeremy Rauch

Vulnerabilities in Sun Solaris 2.6 SNMP - excellent whitepaper that details security vulnerabilities in Sun's implementation of SNMP, with several exploit descriptions included. One of those "must read" documents for any Sun/Solaris admin.

tags | exploit, vulnerability
systems | solaris
MD5 | 347d1448b17f2a5fa5c9006c03fce492
sun.5.6.lpset.txt
Posted Aug 17, 1999

Brief description of the lpset buffer overflow present in Solaris 2.6 (x86).

tags | exploit, overflow, x86
systems | solaris
MD5 | c31586e474aa5c722f89a85adc351876
sunsolve.database.txt
Posted Aug 17, 1999

Sun Microsystems SunSolve Online knowledge database allows malicious users to access privileged information, such as password files and network configurations, about other customers.

tags | exploit
MD5 | 9436839ff07039ef34e73a0c55dc0c1a
tcsh.6.07.bof.txt
Posted Aug 17, 1999

Buffer overflow in tcsh can potentially result in root compromise.

tags | exploit, overflow, root
MD5 | 86e5beb370757118735f00a99262961b
tmp-racer
Posted Aug 17, 1999
Authored by Richard Kettlewell

tmp-racer is a shell script that exploits programs that make insecure uses of /tmp.

tags | exploit, shell
MD5 | 731df7d60aa1abab5d6a571be84d5599
w00f.c
Posted Aug 17, 1999

Another remote/local root exploit for wu-ftpd [12] through [18]. Featured in b4b0 #7, coded by smiler and cossack.

tags | exploit, remote, local, root
MD5 | daac405b71bd87ade26592014e801e7a
websuite.txt
Posted Aug 17, 1999
Authored by cmart

Buffer overflow in SmartDesk WebSuite v2.1 for Windows 98/NT allows remote attacker to execute denial of service attacks, crashing the SDWEBSRV.EXE server.

tags | exploit, remote, denial of service, overflow
systems | windows, 9x
MD5 | 644f8b18a526d526c976bb5ea88333fe
whlpbo.htm
Posted Aug 17, 1999
Authored by David Litchfield

Exploit code and detailed analysis of the Winhlp32.exe buffer overrun. Source code for Windows NT exploit program included.

tags | exploit, overflow
systems | windows, nt
MD5 | 41cda4321d72f3e3a96514b39b241777
winamp.2.x.bof.txt
Posted Aug 17, 1999

Buffer overflow in the WinAMP Windows sound player allows remote attacker to launch simple denial of service attacks that crash WinAMP.

tags | exploit, remote, denial of service, overflow
systems | windows
MD5 | 6cfa9b7be2becd5de5b305a630b7e458
windows.weak.passwds.txt
Posted Aug 17, 1999

Details of the very weak encryption used by Windows applications, and a couple of good tips about ways to increase password security. Probably nothing new here for the veteran NT admin, but well worth reading if you use Win32 at all.

tags | exploit
systems | windows, 32
MD5 | 32642046175e7ab0a2a4e414adb564e9
winhlpadd.exe
Posted Aug 17, 1999
Authored by David Litchfield

Compiled exploit code for Windows NT Winhlp32.exe buffer overrun condition.

tags | exploit, overflow
systems | windows, nt
MD5 | 4f432d9fd90bb58a296fe3702ca6fabb
zks.freedom.flaws.txt
Posted Aug 17, 1999

The Freedom privacy software by Zero-Knowledge Systems is vulnerable to a practical attack, described by Wei Dai, that reveals the supposedly anonymous routes used by the ZKS Freedom software user. In other words, the use of only link padding (ZKS uses no end-to-end padding) means that ZKS Freedom actually provides no security or privacy at all for the end user.

tags | exploit
MD5 | 96b6937617d0bd517615fdc2adcf2a4d
fehmalfv1.tgz
Posted Aug 17, 1999
Authored by Ben-z

New Denial of Service suite that utilizes Back Orifice servers to launch very effective "spoofed" smurf-like attacks with malformed packets and a very impressive amplification ratio.

tags | exploit, denial of service, spoof
MD5 | cca0a5f21a5f38caa25465ec4c25504a
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Even Pokemon Go Was Used By Russia To Meddle In The Election
Posted Oct 13, 2017

tags | headline, government, usa, russia, cyberwar
US Voices Frustration With Warrant-Proof Encryption
Posted Oct 13, 2017

tags | headline, government, privacy, usa, cryptography
An Unknown Hacker Stole Sensitive Data On Australia's War Planes
Posted Oct 13, 2017

tags | headline, hacker, government, australia, data loss, cyberwar
Legacy Office Feature Used In Novel Document Attacks
Posted Oct 13, 2017

tags | headline, hacker, malware, microsoft, flaw
Equifax Rival TransUnion Also Sends Site Visitors To Malicious Pages
Posted Oct 12, 2017

tags | headline, malware
The Myth Of Responsible Encryption: Experts Say It Can't Work
Posted Oct 12, 2017

tags | headline, government, backdoor, cryptography
Equifax Removes Webpage After Malware Issue
Posted Oct 12, 2017

tags | headline, malware, fraud, flaw, adobe
Malware Checks Into Hyatt Hotels Again
Posted Oct 12, 2017

tags | headline, privacy, malware, bank, cybercrime, data loss, fraud
Rick And Morty Episode? Nope, Another CoinMiner
Posted Oct 12, 2017

tags | headline, fraud, cryptography
Judge Says US Government Has No Right To Rummage Through Anti-Trump Protest Website Logs
Posted Oct 12, 2017

tags | headline, government, privacy, usa, fraud
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close