what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Crazy Einstein

Email addresscrazy_einstein at yahoo.com
First Active2002-07-08
Last Active2004-10-26
85mod_include.c
Posted Oct 26, 2004
Authored by Crazy Einstein

Proof of concept exploit for the mod_include module in Apache 1.3.31 that is susceptible to a buffer overflow.

tags | exploit, overflow, proof of concept
SHA-256 | a7d67b6ae598462fcf1311fa7182534dd474a28ce7c057c3264a690b66f04628
85mod_include.adv.txt
Posted Oct 26, 2004
Authored by Crazy Einstein

The mod_include module in Apache 1.3.31 is susceptible to a buffer overflow that allows for arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 055d7f5955acdb2a54ae5d8fe0303663f38e57ee7640eff8edfe63a8e6520ded
85mod_gzip.c
Posted Nov 20, 2003
Authored by Crazy Einstein

Remote exploit for mod_gzip when in debug mode for versions 1.2.26.1a and below. Yields user id of the webserver. Tested against RedHat 8.0 and FreeBSD 4.7.

tags | exploit, remote
systems | linux, redhat, freebsd
SHA-256 | 84af6d61c9fc50f2b274b91ce6e52fe5474e910aad12553f3e47926b21d32e6e
boomerang.tgz
Posted Nov 14, 2003
Authored by Crazy Einstein

Local exploit for the ListBox/ComboBox vulnerabilities in Win32 platforms. Included is an example of a vulnerable program. Related advisory is available here. Tested on Microsoft Windows XP.

tags | exploit, local, vulnerability
systems | windows
SHA-256 | f61c932efba689ebf07ce59c123ce316c2c38a7c038c03fa8755f5576f9aa8e1
85NIPrint.c
Posted Nov 4, 2003
Authored by Crazy Einstein

Remote exploit for Windows that makes use of the buffer overflow vulnerability in NIPrint discussed here.

tags | exploit, remote, overflow
systems | windows
SHA-256 | b8e789a710d11c4ae816a47e4c3c5dc916c7e08b994a2904c440325f1d28ff37
85pxe.c
Posted Mar 17, 2003
Authored by LByte, Crazy Einstein | Site lbyte.void.ru

Remote exploit for Intel's PXE (Pre-boot eXecution Environment) daemon on RedHat Linux 8.0.

tags | exploit, remote
systems | linux, redhat
SHA-256 | 6ee7f60bbf12228d58ccf17f6d93e028fed34300347b2f6d532b8eabc173c677
85deadelf.c
Posted Mar 7, 2003
Authored by Crazy Einstein

Exploit for the file(1) buffer overflow vulnerability found by iDEFENSE. When file is run upon this binary, a shell is bound to port 2003.

tags | exploit, overflow, shell
SHA-256 | 3cd39a300697230bb93932f5c217630f5baeee36b12e0e1b50ced39e0099e3be
httpda.pl
Posted Dec 11, 2002
Authored by Crazy Einstein | Site lbyte.void.ru

HTTPda is a perl script that searches a remote site for forms, .cgi and .pl files.

tags | remote, web, cgi, perl
SHA-256 | a3a3bab1e06d96a25c57f97e38cf006c4f87a7a73c39b74655b5d7f80e29a0ea
sendfaild.c
Posted Dec 11, 2002
Authored by Crazy Einstein | Site lbyte.void.ru

Sendmaild.c is a local root exploit for Sendmail on BSD. Exploits the bug discussed in FreeBSD-SA-01:57. Tested on FreeBSD 4.3-RELEASE with Sendmail 8.11.3.

tags | exploit, local, root
systems | freebsd, bsd
SHA-256 | af378464c45ce674f69dcef1b241d4a304679c343fa1f55700fd04fe7f29c324
2fax.txt
Posted Jul 8, 2002
Authored by Crazy Einstein

2fax prior to v2.02 for Linux and Windows contains a locally exploitable buffer overflow.

tags | overflow
systems | linux, windows
SHA-256 | 14214e7f949c470b58c600c51e76ebc4d256a68496c77854fa8efd95dc259861
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close