exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from tracewar

Email addresstracewar at gmail.com
First Active2002-07-11
Last Active2007-05-03
VP-ASP-SQL.txt
Posted May 3, 2007
Authored by tracewar

VP-ASP suffers from a SQL injection vulnerability. Details provided.

tags | exploit, sql injection, asp
SHA-256 | 688110bd3b6796180b031f9d3cd1dc83a93d1a47dc937364764b82c320563468
vp-asp-new.txt
Posted May 22, 2006
Authored by tracewar

VP-ASP versions 6.00 through 6.08 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection, asp
SHA-256 | 1b5495f9c3740506d9edae8c1736c015f16f163c6fc0bb4ef38ccbaa0eb08332
vpasp600.txt
Posted May 6, 2006
Authored by tracewar

VP-ASP version 6.00 is susceptible to SQL injection attacks. Exploitation details provided.

tags | exploit, sql injection, asp
SHA-256 | 88610c2c58aeabbf0a85467404b623b0dd9f1bf34a86fdf0a43adf16f0eafb0b
pwned-vpasp.txt
Posted Jan 29, 2006
Authored by tracewar

VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.

tags | exploit, sql injection, asp
SHA-256 | 332f445af6a6c5c47f068cb8d8c03ed007441924b9c1604249e696ad8d996b1f
dl-mancgi.c
Posted Sep 7, 2005
Authored by tracewar

Man-cgi/Man2web/ManView remote command execution exploit. Tested against Man-cgi 1.11. All versions are affected.

tags | exploit, remote, cgi
SHA-256 | 3300bb4e9b0b107c205b3358667f3e44b2322107d91b974768b345a5d6beebc5
dl-cups.c
Posted Sep 7, 2005
Authored by tracewar

CUPs 1.x denial of service exploit.

tags | exploit, denial of service
SHA-256 | ff8f9da2b2ed05af80951b23e43eb74ed987f6722dc4d1ea584c2d80c7787aa3
twlib.tar.gz
Posted Jul 21, 2005
Authored by tracewar

Simple replacement binaries for netstat, ls, and ps that enable an attacker or administrator to hide specific strings.

tags | tool, rootkit
systems | unix
SHA-256 | 60b4569d41899121ba50b99fc410a2bd24142d5f2c7bf9931f2512e999cf5ae0
login-back.c
Posted Oct 2, 2003
Authored by tracewar

Backdoor for login where the original binary must be renamed and only gets called whenever the remote user's TERM variable is not set to the magic password. If the magic password is set, the user gets the option of a shell with or without logging.

tags | tool, remote, shell, rootkit
systems | unix
SHA-256 | e3fb9f9f65c704ddf3602b2cf854c54524ca1cacb73518276e083cfaff3953db
tw-imap.c
Posted Aug 1, 2002
Authored by tracewar

IMAP4rev1(lsub) remote exploit. Tested against v12.264, 12.250, 11.241, and 10.223. Requires username and password. Includes offsets for Red Hat and Slackware.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | fab9c3c9f5c88eb5ccef31cc210a623985245fd8043724121dc1b172c2b35492
twgen.c
Posted Jul 31, 2002
Authored by tracewar

Class a/b/c ip list generator.

tags | tool, scanner
systems | unix
SHA-256 | cab6ef757f8875a2ca483e53e574b580bfad6bc37676c6d0f66b6c4194a221b6
snmpXauto.c
Posted Jul 11, 2002
Authored by tracewar

SnmpXdmid auto rooter based on snmpXdmid exploit from http://lsd-pl.net.

tags | exploit, web
SHA-256 | 94ebe956f7f5a101e3099ef94b7ebd458085d3ce2490d32e37966d74a51c61e6
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close