what you don't know can hurt you
Showing 1 - 25 of 31 RSS Feed

Files from synnergy

First Active1999-09-24
Last Active2001-05-30
mailtool-adv.txt
Posted May 30, 2001
Authored by synnergy, Dethy | Site synnergy.net

Local vulnerability in Solaris mailtool(1) - /usr/openwin/bin/mailtool on Solaris 8 (x86 and sparc) contains a local buffer overflow vulnerability. By specifying a long environment buffer containing machine executable code, it is possible to execute arbitrary command(s) as gid mail.

tags | overflow, arbitrary, x86, local
systems | solaris
MD5 | 1e5e671cf9f5a6ad579331d3e7053810
exklock.c
Posted Feb 21, 2001
Authored by synnergy, Dethy | Site synnergy.net

FreeBSD X key lock (xklock) v2.7.1 and below local root exploit - Tested on FreeBSD ports collection v3.5.1 and v4.2.

tags | exploit, local, root
systems | freebsd
MD5 | c5a5aabc95055e9049edae3b5c5de143
dc20ctrlex.perl
Posted Feb 14, 2001
Authored by synnergy, Dethy | Site synnergy.net

Dc20ctrlex.perl is a FreeBSD 3.x/4.X /usr/local/bin/dc20ctrl local exploit which gives egid=dialer or root on non-freebsd systems. Tested against FreeBSD 4.2.

tags | local, root, perl
systems | freebsd
MD5 | 9d658bc02da0498ea3f0146d905dd9af
host-detection.doc
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in TXT form.

tags | paper, protocol
MD5 | 938010bc0d9b99eb9b35830b0f7a13e7
host-detection.pdf
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. (PDF) Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in DOC form.

tags | paper, protocol
MD5 | 2866b8e06c2e023af6d2353b6ac6c628
host-detection.txt
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in DOC form.

tags | paper, protocol
MD5 | 29e1aa57dd7594aeb700b3e563f4579a
portscan.pdf
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers. Text version available here.

tags | arbitrary, protocol
MD5 | aa639e684a8e7913186faa5b0f7081b9
portscan.txt
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers.

tags | arbitrary, protocol
MD5 | 4608dc43a219fc1243b13e3e1ca6f75d
obsd-ftpd.c
Posted Dec 24, 2000
Authored by synnergy, Scrippie | Site synnergy.net

OpenBSD v2.6 and 2.7 ftpd remote root exploit.

tags | exploit, remote, root
systems | openbsd
MD5 | 851ecd7cde4ff528736a6f54e5ea9649
dtors.txt
Posted Dec 13, 2000
Authored by synnergy, Juan M. Bello Rivas | Site synnergy.net

Overwriting the .dtors section - This paper presents a concise explanation of a technique to gain control of a C program's flow of execution given that it has been compiled with gcc. This exploit technique has several advantages over changing the stack pointer, including ease of determining the exact position where we want to write and point to our shellcode, and is simpler than a GOT patch.

tags | shellcode
MD5 | f693cc32d668324c2205e77036aa3fd1
sadmind-sun.brute.c
Posted Nov 14, 2000
Authored by synnergy, Nikolai Abromov

Remote exploit for rpc.sadmind which brute forces the offset. Tested against Solaris X86 and SPARC v2.6 and 7.0.

tags | exploit, remote, x86, cracker
systems | solaris
MD5 | c0c0dc5180d9081f3ba5df8bbfca3981
SLA-17.Anaconda.txt
Posted Oct 15, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-17 - A flaw in Linux/UNIX Anaconda Foundation Directory, a yahoo style search engine based on the Open Directory Project allows remote users to traverse the webservers filesystem, allowing arbitary files to be read by appending a trailing NULL byte in URL encoded format. Exploit URL included.

tags | exploit, remote
systems | linux, unix
MD5 | 4473a774da7c24d3ddf462e13bfbf37e
SLA-16.MasterIndex.txt
Posted Oct 11, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-16 - Synnergy Labs has found a flaw within Master Index for Linux/UNIX that allows a user to successfully traverse the filesystem on a remote host, allowing arbitary files/folders to be read. Exploit URL included. Fix available here.

tags | exploit, remote
systems | linux, unix
MD5 | a00a442f87ac62e4716afc3cc58d0c62
SLA-15-PHPix.txt
Posted Oct 10, 2000
Authored by synnergy, Kostas Petrakis | Site synnergy.net

PHPix, a Web-based photo album viewer written in PHP has a vulnerability which allows remote users to traverse directories and read any file on the server. Exploit URL included. Fix available here.

tags | exploit, remote, web, php
MD5 | bc3908f2f9d85da09ccb7ad48698fd82
inebriation.c
Posted Oct 3, 2000
Authored by synnergy, Scrippie | Site synnergy.net

Inebriation.c is a local linux/x86 /bin/su + locale libc functions exploit which has been written in response to previous unreliable exploits for this vulnerability. It includes a perl wrapper to find the correct offset, can use GOT overwrites to evade stackguard, stackshield, and libsafe, uses clean overflow string creation, and has documentation and several other usability improvements.

tags | exploit, overflow, x86, local, perl
systems | linux
MD5 | a4ea18e81fddb4c040951cf4232de56a
bug-testing.txt
Posted Oct 3, 2000
Authored by synnergy, Dethy | Site synnergy.net

The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.

MD5 | 93ccf43ca9128f73447bd47fe1fa89f1
tco.txt
Posted Sep 22, 2000
Authored by synnergy, Dethy | Site synnergy.net

Synnergy Laboratories Advisory SLA-2000-14 - The BSD/Linux telnet client has a stack overflow which is not usually a security problem, except in the case of a restricted shell environment which allows users to set environment variables and run telnet. Perl proof of concept exploit included.

tags | exploit, overflow, shell, perl, proof of concept
systems | linux, bsd
MD5 | c6491ecc47f199f8a19a31d67e79f43c
bandmon-0.2.tar.gz
Posted Aug 14, 2000
Authored by synnergy | Site synnergy.net

Bandmon monitors the bandwidth usage on your network.

MD5 | f428ce70692dfa952d10c6d16f3727ce
wais.pl.advisory.txt
Posted Aug 14, 2000
Authored by synnergy, Scrippie | Site synnergy.net

The wais.pl CGI written by Tony Sanders provides means to access the waisq WAIS client via the webserver. Waisq contains buffer overflows allowing remote code execution which can be exploited via wais.pl. In addition, files owned by nobody on the webserver can be overwritten with arbitrary content. Includes exploit for Linux/x86.

tags | exploit, remote, overflow, arbitrary, x86, cgi, code execution
systems | linux
MD5 | 795f85e6d55de6d0878a8c35c77da7a9
msadcscan-unix.c
Posted Dec 13, 1999
Authored by synnergy, elux | Site synnergy.net

Synnergy Networks msadc scanner - This is just a basic string scanner that happens to scan for the msadc module string.

MD5 | 848292758ce51eeecb718dea80503411
fakelog-unix.c
Posted Dec 13, 1999
Authored by synnergy, Headflux

Sends message to everyone on unix system via syslog().

systems | unix
MD5 | 03de4874a8f333ee6918dd99448e08b1
sadmindex-brute-lux.c
Posted Dec 13, 1999
Authored by synnergy, elux

Sadmind exploit stack pointer brute forcer, just ./sadmindex-brute-lux [arch] <host> and it will brute force the stack pointer, it'll output a message on success and open ingreslock (1524) on the remote computer. This brute forcer requires sadmind exploit by Cheez Whiz.

tags | remote, cracker
MD5 | 7588b1cbff18bd6bcdb5fe10b4e85ada
qpop-linux
Posted Dec 10, 1999
Authored by synnergy, Headflux | Site synnergy.net

Remote buffer overflow exploit in perl for QPOP 3.0b<=20 running on Linux.

tags | remote, overflow, perl
systems | linux
MD5 | 5ea48ff2b2dd6aaac4f0fcef8bc4b30e
syn.jpg
Posted Dec 10, 1999
Authored by synnergy

Synnergy Logo

MD5 | 2e2bbb3a163530be6d329e216d48adec
bindshell-unix
Posted Dec 5, 1999
Authored by synnergy, Headflux | Site synnergy.net

Remote unix shell backdoor written in perl.

tags | remote, shell, perl
systems | unix
MD5 | e7a347c80e9c5df1b8d3232f4848e7f4
Page 1 of 2
Back12Next

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close