exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files from Dethy

Email addressdethy at synnergy.net
First Active1999-12-01
Last Active2001-05-30
mailtool-adv.txt
Posted May 30, 2001
Authored by synnergy, Dethy | Site synnergy.net

Local vulnerability in Solaris mailtool(1) - /usr/openwin/bin/mailtool on Solaris 8 (x86 and sparc) contains a local buffer overflow vulnerability. By specifying a long environment buffer containing machine executable code, it is possible to execute arbitrary command(s) as gid mail.

tags | overflow, arbitrary, x86, local
systems | solaris
SHA-256 | 28123a605ca63233f3753280128acfc9dae8cb526852a55c509794079049a661
elvwreck.c
Posted Mar 2, 2001
Authored by Dethy | Site synnergy.net

FreeBSD 3.5.1 and 4.2 ja-elvis and ko-helvis (ports packages) local root exploit. Both come with a utility called elvrec that is installed suid root by default.

tags | exploit, local, root
systems | freebsd
SHA-256 | 7c88100f599842056224afe39698572f91d9ba0b60da1ce3bee4d4c02ae4b7e3
exklock.c
Posted Feb 21, 2001
Authored by synnergy, Dethy | Site synnergy.net

FreeBSD X key lock (xklock) v2.7.1 and below local root exploit - Tested on FreeBSD ports collection v3.5.1 and v4.2.

tags | exploit, local, root
systems | freebsd
SHA-256 | c4dd124149e7e5bf8e081992f5222838ea736a6a2d2fb554c015d78b41490b57
dc20ctrlex.perl
Posted Feb 14, 2001
Authored by synnergy, Dethy | Site synnergy.net

Dc20ctrlex.perl is a FreeBSD 3.x/4.X /usr/local/bin/dc20ctrl local exploit which gives egid=dialer or root on non-freebsd systems. Tested against FreeBSD 4.2.

tags | local, root, perl
systems | freebsd
SHA-256 | 0ee7eafa568512a4b7334811bc84051fe517eb7fd32f411ca85392498b9a8296
host-detection.doc
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in TXT form.

tags | paper, protocol
SHA-256 | bcd0ca5e08abcf9b92576d7bbdfe79270109a9dc5685889090c874ac94464ac1
host-detection.pdf
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. (PDF) Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in DOC form.

tags | paper, protocol
SHA-256 | 6dddf484c6959f1f4a3b6533132356f04a4ea4c299828360d6ea8137831b6ef4
host-detection.txt
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in DOC form.

tags | paper, protocol
SHA-256 | c637cd2c806c90bbcf3e707e1c72035f73fcc09ee0e3815a1797cf12bc6a9636
portscan.pdf
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers. Text version available here.

tags | arbitrary, protocol
SHA-256 | 22abdfcab10f441e0501420efec15d503b45b165a5be82400b3e1e96c014b32c
portscan.txt
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers.

tags | arbitrary, protocol
SHA-256 | 4fd4b2bbef21c64d1c9c2fdebd6a48b8ea628ca311becdf898a6cf1dbfc00282
bug-testing.txt
Posted Oct 3, 2000
Authored by synnergy, Dethy | Site synnergy.net

The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.

SHA-256 | 8bc6adbc535cfdd7f4e996480e70c7cd1a8990ed92f93b47763a32b051f2ba6e
tco.txt
Posted Sep 22, 2000
Authored by synnergy, Dethy | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-14 - The BSD/Linux telnet client has a stack overflow which is not usually a security problem, except in the case of a restricted shell environment which allows users to set environment variables and run telnet. Perl proof of concept exploit included.

tags | exploit, overflow, shell, perl, proof of concept
systems | linux, bsd
SHA-256 | edc44b44131a6f19bee4f950cce7723477469f167ee3406d25923487214db406
sambar-http.txt
Posted Sep 15, 2000
Authored by Dethy | Site synnergy.net

Sambar Server 4.4 Beta 3 and below for WinNT, Win95 OSR2, (possibly Linux affected) contains a vulnerability which allows remote users to browse the filesystem of the webserver. Fix available here.

tags | exploit, remote
systems | linux, windows
SHA-256 | 682efe87f41f4ff59f349e51db891761fcbe069277019c774fc845c93fc2a01d
typsoft-ftpd.txt
Posted Sep 12, 2000
Authored by Dethy | Site synnergy.net

TYPSoft FTP Server 0.78 for Windows 9X and WinNT is vulnerable to a denial of service attack. Sending a long user or pass commands causes the server to hang and increase system resources. Perl exploit included.

tags | exploit, denial of service, perl
systems | windows
SHA-256 | 6290ed9092ce73d9e92df721518efe218bf3ccf081ac7b79d93e84f30cccd104
darxite.tar.gz
Posted Aug 23, 2000
Authored by Dethy | Site synnergy.net

Darxite, a daemon that retrieves files via FTP or HTTP, has several vulnerabilities throughout the code that allow a local/remote user to crash the servers, as well as a passwd authentication remote overflow, allowing remote shell access as the uid of the darxite daemon. Exploit and advisory included. Tested against Linux x86 systems.

tags | exploit, remote, web, overflow, shell, x86, local, vulnerability
systems | linux
SHA-256 | 2c5a17a7af5e62b8c35d708754842d9f6d13efbcd99d19896e60c3d9ca6f3760
exp-wmcd.c
Posted Apr 19, 2000
Authored by Dethy

Local exploit for Linux Mandrake 7.0's wmcdplay 1.0 beta 1. Unlike the Teso exploit for wmcdplay, this code exploits the -position argument.

tags | exploit, local
systems | linux, mandrake
SHA-256 | eed00eb19c97858a9e3a92302523c50bd3259f79d45239243286e9ab1b43681f
delegate.c
Posted Dec 1, 1999
Authored by Dethy | Site synnergy.net

Delegate 5.9.0 remote exploit for FreeBSD 3.2.

tags | exploit, remote
systems | freebsd
SHA-256 | c8b15f8cc3129759828d662578ab2d94ba4d1d03a02a5fce93716cbfba60a526
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    36 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close