what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Sorbo

Email addresssorbox at yahoo.com
First Active2002-02-26
Last Active2014-03-18
nginx 1.4.0 64-bit Linux Remote Code Execution
Posted Mar 18, 2014
Authored by Sorbo

nginx version 1.4.0 remote code execution exploit that leverages a new attack technique called BROP (Blind ROP).

tags | exploit, remote, code execution
systems | linux
advisories | CVE-2013-2028
SHA-256 | 8352b0f536d1d2db731dbea6ffe0990452b85c17e1de3830432937e8c4173ec3
Linux perf_swevent_init Privilege Escalation
Posted Mar 12, 2014
Authored by Brad Spengler, Sorbo

This is a ROP exploit variant of the perf_swevent_init local root exploit for the Linux kernel versions prior to 3.8.9 for x86_64.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2013-2094
SHA-256 | f2e2d43cd1b1f6062d1700da019b5cc1e08dbf07427dcb52fc47281b57ddf45f
Linux perf_swevent_init Local Root
Posted Jun 11, 2013
Authored by Sorbo

perf_swevent_init local root exploit for the Linux kernel versions prior to 3.8.9 for x86_64. Based off of sd's exploit.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2013-2094
SHA-256 | 59caf806b1911994747249031fa80d9f7f763d3edc8c72e2689c9b4185164b11
sorpine.c
Posted Sep 16, 2003
Authored by Sorbo | Site darkircop.org

Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here.Binds a shell to port 6682. Written for Slackware 8.0, 8.1, and 9.0 and works for RedHat as well.

tags | exploit, remote, shell
systems | linux, redhat, slackware
SHA-256 | e851c723d21209a6b26900e885356e35a071b04eb77c23187facc15b5835af99
sormail.c
Posted Apr 18, 2003
Authored by Sorbo | Site darkircop.org

Local exploit for sendmail 8.11.6 which takes advantage of the vulnerable prescan() function which allows users to input 0xff to skip the length check of the buffer. Includes targets for Slackware 8.0, Redhat 7.2, and Redhat 7.3.

tags | exploit, local
systems | linux, redhat, slackware
SHA-256 | 6c7b5fd249e10c235502380844b5482f60d098427bce8782f3b77db91c26779f
sorsync.c
Posted Nov 17, 2002
Authored by Sorbo

Remote exploit for rsync version 2.5.1 and below run on Linux. This exploit makes use of a simple frame pointer overflow.

tags | exploit, remote, overflow
systems | linux
SHA-256 | 6d22b5088d7fc52eb994bcfe37975d15f67800c96849738dce0efa68d5b1fe86
sortrace.c
Posted Oct 10, 2002
Authored by Sorbo

Linux Traceroute v1.4a5 and below local root exploit which takes advantage of a malloc chunk vulnerability. Uses gdb to find offsets.

tags | exploit, local, root
systems | linux
SHA-256 | 2b8d9dac84e0f7dd993e19acd912184417a595f94fb1481ffc67eaa6c492e43e
sortelnetd.tgz
Posted Feb 26, 2002
Authored by Sorbo

Sortelnetd is a working telnetd 0.17 exploit (even remote if you are careful enough). alignment is critical. Includes a demo of how to find offsets and use against localhost.

tags | exploit, remote
SHA-256 | 6e643b30e9635a5e3b22d1113b59356de6894ddf8033ed508db6d01f8a7808f3
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close