exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from deadbeat

First Active2002-10-30
Last Active2003-08-12
ibmdb2.pl
Posted Aug 12, 2003
Authored by deadbeat

IBM DB2 local root from bin exploit that makes use of the fact that /usr/IBMdb2/V7.1/lib is left world writable after a default installation.

tags | exploit, local, root
SHA-256 | af0f255f31a50691e25984454e0d874e5554b1017742155e36928b25e81ea632
lukemftp.pl
Posted Aug 12, 2003
Authored by deadbeat

realpath(3) lukemftpd remote exploit for FreeBSD 4.8 that makes use of the off-by-one error.

tags | exploit, remote
systems | freebsd
SHA-256 | 97c90d5b2ccc417562521347fcbe9c9fa3363dd44b3ea5d475b6f7b255d0c086
slocate_sparc.pl
Posted Aug 12, 2003
Authored by deadbeat

Local root exploit for slocate on Linux-Sparc.

tags | exploit, local, root
systems | linux
SHA-256 | 4120fc3b286e38064f2f473b07a64a039c06d26733b33dc3ed74f8aa307fa14c
ciscodos.pl
Posted Aug 10, 2003
Authored by deadbeat

Remote denial of service exploit for the Cisco CSS 11000 Series.

tags | exploit, remote, denial of service
systems | cisco
SHA-256 | c5ef0113e39d3c73ba4df7113af56372b1444b5439d9cdf3ae4f662aee1524da
postfix.pl
Posted Aug 5, 2003
Authored by deadbeat

Remote denial of service exploit that makes use of the Postfix vulnerability discussed here.

tags | exploit, remote, denial of service
advisories | CVE-2003-0540
SHA-256 | 54fd82b0d9859aa96b40ddaf97c6305be1201cdb2e93594702a51808237266a1
myserver-0.4.1.txt
Posted Jun 24, 2003
Authored by deadbeat

MyServer 0.4.1 is vulnerable to a denial of service when a GET request with 20 forward slashes gets sent to the server.

tags | exploit, denial of service
SHA-256 | ca1b79e5b025115c5ec9cb904c864f70dc107b1f2555787902900093a7b61b14
webmail_local.pl
Posted Feb 20, 2003
Authored by deadbeat, C0w-d0g

Cpanel + Openwebmail local root exploit in perl which affects Cpanel 5 and below. Attempts to copy a suid root zsh into /tmp by exploiting /usr/local/cpanel/base/openwebmail/oom.

tags | exploit, local, root, perl
SHA-256 | b8529d38cfef755d74cff0d812d2ae5a837fb4a77d433c676607eab5980c5ef1
bison_slap.pl
Posted Feb 19, 2003
Authored by deadbeat

BisonFTP v4.r2 remote denial of service exploit in perl. Tested against Windows 98.

tags | exploit, remote, denial of service, perl
systems | windows
SHA-256 | 97d8de62192a0625ac18734043ac9b63b6773448e623ae0e3bef47baf8a7cf53
astaro-bounce.pl
Posted Feb 18, 2003
Authored by deadbeat

Astaro Linux Firewall Bounce scan. Attempts to grab a banner from a given ip and port.

tags | tool, scanner
systems | linux, unix
SHA-256 | 3ad8ddcd786f787e0b62854cfaf72adbcea82f6d1d34e227d193c2eeb8a5a731
absolute_uk2.pl
Posted Feb 18, 2003
Authored by deadbeat

Absolute Telnet v2.00 buffer overflow exploit in perl. Creates a fake server for the client to connect to, and sends an overflow string once it connects. Tested against Windows XP, based on an advisory by kain@ircop.dk.

tags | exploit, overflow, perl
systems | windows
SHA-256 | af8d5ae98253a8deeb5f462c4c4313d439dc7c3a4d6ee776926612f86b27c414
pc-cillin.pl
Posted Dec 11, 2002
Authored by deadbeat

Pc-cillin pop3trap.exe buffer overflow exploit in perl. Return address is off a little making it a denial of service exploit, but could be tweaked to execute shellcode that downloads a trojan.

tags | exploit, denial of service, overflow, trojan, perl, shellcode
SHA-256 | 8243cebd28bc9dc9a0fc4bca0bc3789808f36fb517a6a3f0b81c499438776f38
trendmacro.pl
Posted Dec 6, 2002
Authored by deadbeat

Trendmacro is a ISVW V3.6 proxy bouncer and banner grabber in perl. Grabs HTTP banners through a proxy.

tags | tool, web, scanner, perl
systems | unix
SHA-256 | aa43f1de04c24c95ac7e59e14e9bbd991950c0f67e3e3b38d7e84adb93926934
apachedos.pl
Posted Dec 6, 2002
Authored by deadbeat

Apache 1.3.xx / Tomcat server with mod_jk remote denial of service exploit which uses chunked encoding requests, as described in Qualys Security Advisory QSA-2002-12-04.

tags | remote, denial of service
SHA-256 | 26c922cb94695de52658f3b16ebbeebff4426b27d96a6b5ee0ee308e4f190146
Oracle9iAS.dos.pl
Posted Oct 30, 2002
Authored by deadbeat

Oracle9iAS Web Cache Denial of Service exploit in perl, as described in Atstake advisory a102802-1.

tags | exploit, web, denial of service, perl
SHA-256 | b04f91f65d13ef5a37fc7fa56dcbc09b494c14e7d26b988206b52a9aaff32e39
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close