what you don't know can hurt you
Showing 1 - 25 of 26 RSS Feed

Files from Bob

Email addressbob at dtors.net
First Active2002-07-08
Last Active2012-06-28
OpenSSH 6.0p1 Full Backdoor Patch
Posted Jun 28, 2012
Authored by Bob | Site dtors.net

This patch for OpenSSH 6.0 Portable adds a hardcoded skeleton key, removes connection traces in the log files, usernames and passwords both in and out are logged, and more.

tags | patch
systems | unix
MD5 | 7753b7580751d604a864a09175a5945c
Bash Root Shell Backdoor
Posted Jun 28, 2012
Authored by Bob | Site dtors.net

This patch is a backdoor to bash that will create a setuid backdoor shell in /tmp if run as root.

tags | shell, root, patch, bash
systems | unix
MD5 | 80a9346667b79669e3db8cb7e2ef3d24
OpenSSH 6.0p1 Magic Password Patch
Posted Jun 28, 2012
Authored by Bob | Site dtors.net

This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password.

tags | patch
systems | unix
MD5 | 76830af90bed3531d0db957c8b264924
Set Loop Shellcode
Posted Apr 21, 2004
Authored by Bob, dsr | Site dtors.net

A shellcode that automatically obtains the highest available uid to setuid().

tags | shellcode
MD5 | f4136d365f3f880656449a228fe0c963
lnx-smart.tgz
Posted Apr 21, 2004
Authored by Bob, dsr | Site dtors.net

Smart shellcode which prompts the user for the uid to setuid() with.

tags | shellcode
MD5 | 7af85660b4523017e97a29918ef2e49b
YahPoo.c
Posted Jul 14, 2003
Authored by Bob, dsr | Site dtors.net

Exploit for Yahoo Messenger, Yahoo Module that allows for remote command execution on a victim machine via bad URI handling. Requires the victim to view the html.

tags | exploit, remote
MD5 | 1f8a1f0189da4662ead77ad7254d271a
Yahoo-ducky.txt
Posted Jul 6, 2003
Authored by Bob, Rave | Site dtors.net

Yahoo Messenger 5.5 and below suffers from a buffer overflow that was originally discovered and fixed in May of 2002, but has since resurfaced. Systems Affected: Windows NT/2000/SP1/SP2/SP3, Windows ME, Windows 95/98, Windows XP.

tags | exploit, overflow
systems | windows, 9x, nt, me, xp
MD5 | 6f46595fb8f8c9ab9e7d127ab94b1f67
manipulating.dtors.txt
Posted Jul 6, 2003
Authored by Bob, dsr

A paper that details the manipulation of the destructor when utilizing a buffer overflow, a format string attack, or corrupting a malloc chunk.

tags | paper, overflow
systems | unix
MD5 | cf655444e6c3559bebdf6fd69d4b4aeb
dsr-adv001.txt
Posted May 12, 2003
Authored by Bob, Knud Erik Hojgaard | Site dtors.net

Firebird has 3 binaries: gds_inet_server, gds_drop, and gds_lock_mgr, which all use insufficent bounds checking in conjunction with getenv(), making each one susceptible to local exploitation. Enclosed are two local root exploits tested against versions 1.0.0 and 1.0.2 on FreeBSD.

tags | exploit, local, root
systems | freebsd
MD5 | 3b1e72930195b5834044974c51c259aa
DSR-cpanel.c
Posted Feb 20, 2003
Authored by Bob | Site dtors.net

Cpanel 5 and below remote exploit which allows users to view any file or execute remote commands due to an insecure open call in guestbook.cgi. Local root vulnerabilities also exist.

tags | exploit, remote, local, cgi, root, vulnerability
MD5 | 3b3e532e3718324aaa6fa16ed89e63f2
DSR-nethack.c
Posted Feb 20, 2003
Authored by Bob | Site dtors.net

Nethack v3.4.0 local buffer overflow exploit which spawns a shell as uid=games. Runs /usr/games/lib/nethackdir/nethack.

tags | exploit, overflow, shell, local
MD5 | 3b81d062cf1cb44bc672fbd44da2173e
bof4kids2.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Buffer Overflows for Kids part 2 - This is part two, the follow on from bofs4kids. In this tutorial I am going to attempt to give you the knowledge to be able to e exploit a program, without coding in C. But we will need to use gdb quite a bit, so any prior knowledge would be helpful but not necessary.

tags | overflow
MD5 | 4cfd9785b13c35dc81b71b93e26cb49f
bofs4kids.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

This tutorial is not going to teach you how to code an exploit, but what it is going to do is give you a good understanding of what a buffer overflow is, what types of buffer overflows there are, how we would go about exploiting a buffer overflow, and how to identify a buffer overflow. C and ASM knowledge is not required.

tags | overflow
MD5 | 7fbf27ec6573ab0c860055f326755bf1
bish.c
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Bish.c is multi-platform shellcode tested on FreeBSD 4.6-PRERELEASE, FreeBSD 4.5-RELEASE, OpenBSD 3.0, NetBSD 1.5.2, Linux 2.0.36, Linux 2.2.12-20, and Linux 2.2.16-22. Based on code by Zillion, added setuid().

tags | shellcode
systems | linux, netbsd, freebsd, openbsd
MD5 | d5f1336e3d3ab4c064e0960020fef945
FV.txt
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Finding Vulnerabilities - This paper explains the auditing of C source code to find application exploits. Includes a practical example of how to hack an IDS that was coded for a website.

tags | paper, vulnerability
systems | unix
MD5 | 6e349f14320160b2b874d172bdb12a94
shellcodin.txt
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Shellcoding - How to write shellcode for Linux/x86. Includes parts I + II.

tags | paper, x86, shellcode
systems | linux, unix
MD5 | f6ce6ce0746488247aaaf2c3ee8e867c
DSR-chmod.c
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Linux x86 shellcode which does a chmod("//bin/sh" ,04775); set sh +s.

tags | x86, shellcode
systems | linux
MD5 | a75dfc85d1fde7f2ab86831345102ea3
DSR-write.c
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Linux x86 shellcode which does a write(stdout,"bob from DSR", 15); exit;.

tags | x86, shellcode
systems | linux
MD5 | 8ac3413ff94cd12251c9a92492424611
DSR-setuid.c
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Linux x86 shellcode which does a setuid(); execve(); exit();.

tags | x86, shellcode
systems | linux
MD5 | 007db61a364ebbf79c5ea83f6dc86f09
DSR-passwd.c
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Linux x86 shellcode, to open() write() close() and exit(), adds a root user no-passwd to /etc/passwd.

tags | x86, root, shellcode
systems | linux
MD5 | 117ee3f5b27628302449296f1ecf6f4c
DSR-execve.c
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Linux x86 shellcode which does execve()/bin/ash; exit; in 34 bytes.

tags | x86, shellcode
systems | linux
MD5 | be081400dca64065855add976aa3369e
DSR-29byte.c
Posted Sep 17, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Linux x86 29 byte shellcode.

tags | x86, shellcode
systems | linux
MD5 | 04c5b3189e0bc231736eb5285b0c3874
DSR-apache2.0x.c
Posted Aug 29, 2002
Authored by Bob, dsr | Site dtors.net

This Proof of Concept exploit for the current directory traversal design flaw in apache 2.0.x - 2.0.39 allows any attacker to view any file on the target machine. Original vulnerability found by Luigi Auriemma. Affected Systems: Windows [win32], Netware, OS2, Cygwin.

tags | exploit, proof of concept
systems | windows, 32
MD5 | 2ba457a832be506c17d2c9da5e1d72ab
DSR-php4.2x.c
Posted Jul 27, 2002
Authored by Bob, dsr

PHP v4.2.0 and 4.2.1 with Apache 1.3.26 POST bug proof of concept exploit for x86. Produces a segmentation violation (signal 11).

tags | exploit, x86, php, proof of concept
MD5 | 58ecc56a105c84c16cacabb2d7b4ba2c
bash-door.tar.gz
Posted Jul 8, 2002
Authored by Bob, dsr | Site dtors.net

Backdoors Bash-2.05 for local root.

tags | tool, local, root, rootkit, bash
systems | unix
MD5 | c6edcabbcd0ade055d43a041c42f2c50
Page 1 of 2
Back12Next

File Archive:

February 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    33 Files
  • 2
    Feb 2nd
    30 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    8 Files
  • 5
    Feb 5th
    11 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    1 Files
  • 8
    Feb 8th
    37 Files
  • 9
    Feb 9th
    15 Files
  • 10
    Feb 10th
    11 Files
  • 11
    Feb 11th
    26 Files
  • 12
    Feb 12th
    8 Files
  • 13
    Feb 13th
    1 Files
  • 14
    Feb 14th
    1 Files
  • 15
    Feb 15th
    9 Files
  • 16
    Feb 16th
    33 Files
  • 17
    Feb 17th
    6 Files
  • 18
    Feb 18th
    10 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    1 Files
  • 21
    Feb 21st
    1 Files
  • 22
    Feb 22nd
    17 Files
  • 23
    Feb 23rd
    15 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    28 Files
  • 26
    Feb 26th
    25 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close