exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from D4rkGr3y

Email addressgrey_1999 at mail.ru
First Active2002-08-16
Last Active2003-12-16
m00-apache-w00t.tar.gz
Posted Dec 16, 2003
Authored by D4rkGr3y | Site m00.ru

Apache 1.3.*-2.0.48 remote users disclosure exploit - Checks Apache webservers for a wrong default configuration of mod_userdir which allows account name guessing and then attempts to login to the found accounts with ftp. Effective against Linux and *BSD boxes.

tags | exploit, remote
systems | linux, bsd
SHA-256 | 9ebf9d02a9390c8ff2fee63f5a4681199fc9a1055bff1cbd68bce1199fcc32d8
m00-HL-portbind.c
Posted Aug 12, 2003
Authored by D4rkGr3y, Over_G

Half-Life client version 1.1.1.0 and below remote exploit that binds a cmd.exe on port 61200.

tags | exploit, remote
SHA-256 | 3f14ae28b795a3f58ee2ba95559f9d3f1d23e8d1fa3c96ba0a630644c8a96623
mdaemon-dos.txt
Posted Oct 29, 2002
Authored by D4rkGr3y | Site dhgroup.org

A denial of service vulnerability found in Alt-n MDaemon v6.0.7 can allow malicious users to remotely crash this application. This vulnerability, which may also affect earlier MDaemon versions, resides in the method used by MDaemon's POP3 service to process user input that is received with the DELE or UIDL commands.

tags | denial of service
SHA-256 | 07650faab656a8d91cb8ed724f20ad9523b77e5bbbc62b13e94dbfcd3b31d987
tftp.dos.pl
Posted Oct 25, 2002
Authored by D4rkGr3y | Site dhgroup.org

Solarwinds TFTP server v5.0.55 and below remote denial of service exploit in perl.

tags | exploit, remote, denial of service, perl
SHA-256 | 165893e2a72b6c7b01bf0b5e59020ebd0ef42cf6184037b8c607536b68ae7f46
MWS_exp.pl
Posted Aug 16, 2002
Authored by D4rkGr3y | Site dhgroup.org

MyWebServer v1.0.2 remote buffer overflow exploit in perl. Included shellcode opens a shell on port 7788.

tags | exploit, remote, overflow, shell, perl, shellcode
SHA-256 | 8c2cbfbfd316cc19961269f859f90381c0f9e3ebd64bda72f95f110da0564451
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close