exploit the possibilities
Showing 1 - 9 of 9 RSS Feed

Files from JW Oh

Email addressmat at monkey.org
First Active2000-10-27
Last Active2003-03-27
wd.pl
Posted Mar 27, 2003
Authored by JW Oh | Site monkey.org

Wd.pl is a remote IIS exploit in perl which exploits the bug in ntdll.dll described inms03-007. Tested on Windows 2000 Advanced Server SP3 - Korean language edition.

tags | exploit, remote, perl
systems | windows
MD5 | bc7a10f11c570c05c9270352b83bc6cb
eat_gopher.pl
Posted Jul 30, 2002
Authored by JW Oh | Site monkey.org

IE gopher buffer overflow exploit. Tested on W2k Korean and Wme Korean.

tags | exploit, overflow
MD5 | 2a09eb0b9caf8054b336df4c417a2692
smash_bin_login.c
Posted Dec 28, 2001
Authored by JW Oh | Site monkey.org

Solaris x86 v2.8 /bin/login via telnet remote buffer overflow exploit. Uses fixed addresses. Executes any command as root.

tags | exploit, remote, overflow, x86, root
systems | solaris
MD5 | a738b5f4370aa08653cf62c7c419bf8b
ida-exploit.sh
Posted Jul 24, 2001
Authored by JW Oh | Site monkey.org

Windows 2000 remote IIS .ida exploit - Spawns a shell on port 8008. Tested on Win2k with no service pack and SP2. Includes instructions on finding the offset.

tags | exploit, remote, shell
systems | windows
MD5 | 00e34a156bbe3fe1825c7cec62b3b266
mon_pine.sh
Posted Dec 12, 2000
Authored by JW Oh | Site hacksware.com

Pine v4.30 and below allows outgoing mail to be hijacked if the alternate editor is enabled. Exploit script included.

tags | exploit
MD5 | 443b7280f8a78155d5be2e6a46cd645d
sbo_ethereal.c
Posted Nov 19, 2000
Authored by JW Oh | Site hacksware.com

Ethereal v0.8.13 advisory and remote exploit for Linux x86. A stack overflow in the AFS packet parsing routine allows a spoofed packet to start a root shell bound to TCP port 36864.

tags | exploit, remote, overflow, shell, x86, root, spoof, tcp
systems | linux
MD5 | fd8ecf481dd69e08202db3024f1d0e74
gbook.cgi.txt
Posted Nov 12, 2000
Authored by JW Oh | Site hacksware.com

GBook - A web site guestbook has a remote command execution vulnerability in gbook.cgi.

tags | exploit, remote, web, cgi
MD5 | 351b4ca970e916d2a7c0de350a800c2a
dump.sh
Posted Nov 2, 2000
Authored by JW Oh

Dump v0.4b15 and below for Linux contains a trivial local root vulnerability. Includes proof of concept exploit tested on Redhat 6.2.

tags | exploit, local, root, proof of concept
systems | linux, redhat
MD5 | 69eeab6ebaab1b634bef4dfb3899fe88
ntop-w-exp.c
Posted Oct 27, 2000
Authored by JW Oh

Ntop -w v1.2a1 remote stack overflow exploit. Ntop in web mode (-w) contains an overflow when a long filename is requested. Fix available here.

tags | exploit, remote, web, overflow
MD5 | abb80e9bb02c833b5ddf7f8b1f693065
Page 1 of 1
Back1Next

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close