exploit the possibilities
Showing 1 - 14 of 14 RSS Feed

Files from deadbeat

First Active2002-10-30
Last Active2003-08-12
ibmdb2.pl
Posted Aug 12, 2003
Authored by deadbeat

IBM DB2 local root from bin exploit that makes use of the fact that /usr/IBMdb2/V7.1/lib is left world writable after a default installation.

tags | exploit, local, root
MD5 | 411486efa02d407d53da81397cbcc2db
lukemftp.pl
Posted Aug 12, 2003
Authored by deadbeat

realpath(3) lukemftpd remote exploit for FreeBSD 4.8 that makes use of the off-by-one error.

tags | exploit, remote
systems | freebsd
MD5 | 9e343c9c93cd8db1abb79c17d467d652
slocate_sparc.pl
Posted Aug 12, 2003
Authored by deadbeat

Local root exploit for slocate on Linux-Sparc.

tags | exploit, local, root
systems | linux
MD5 | 18b263d22c67433ac2accd80dd963e1d
ciscodos.pl
Posted Aug 10, 2003
Authored by deadbeat

Remote denial of service exploit for the Cisco CSS 11000 Series.

tags | exploit, remote, denial of service
systems | cisco
MD5 | fd1172b357f5184e5985b355b0690ccd
postfix.pl
Posted Aug 5, 2003
Authored by deadbeat

Remote denial of service exploit that makes use of the Postfix vulnerability discussed here.

tags | exploit, remote, denial of service
advisories | CVE-2003-0540
MD5 | c135a293a187f47785ebb9c558d4db0b
myserver-0.4.1.txt
Posted Jun 24, 2003
Authored by deadbeat

MyServer 0.4.1 is vulnerable to a denial of service when a GET request with 20 forward slashes gets sent to the server.

tags | exploit, denial of service
MD5 | f3ff412cbcda773136f7d61cd680630d
webmail_local.pl
Posted Feb 20, 2003
Authored by deadbeat, C0w-d0g

Cpanel + Openwebmail local root exploit in perl which affects Cpanel 5 and below. Attempts to copy a suid root zsh into /tmp by exploiting /usr/local/cpanel/base/openwebmail/oom.

tags | exploit, local, root, perl
MD5 | 7e63aefe7851c82f7b4cf3fb23c7f0ee
bison_slap.pl
Posted Feb 19, 2003
Authored by deadbeat

BisonFTP v4.r2 remote denial of service exploit in perl. Tested against Windows 98.

tags | exploit, remote, denial of service, perl
systems | windows, 9x
MD5 | 277856a954e219f9d43732719681b0ef
astaro-bounce.pl
Posted Feb 18, 2003
Authored by deadbeat

Astaro Linux Firewall Bounce scan. Attempts to grab a banner from a given ip and port.

tags | tool, scanner
systems | linux, unix
MD5 | 21f26143e5e40f09e1f6971b8e6f1826
absolute_uk2.pl
Posted Feb 18, 2003
Authored by deadbeat

Absolute Telnet v2.00 buffer overflow exploit in perl. Creates a fake server for the client to connect to, and sends an overflow string once it connects. Tested against Windows XP, based on an advisory by kain@ircop.dk.

tags | exploit, overflow, perl
systems | windows, xp
MD5 | efb5f8069a8009f009dfcc20853a62c5
pc-cillin.pl
Posted Dec 11, 2002
Authored by deadbeat

Pc-cillin pop3trap.exe buffer overflow exploit in perl. Return address is off a little making it a denial of service exploit, but could be tweaked to execute shellcode that downloads a trojan.

tags | exploit, denial of service, overflow, trojan, perl, shellcode
MD5 | f8b00015a53191bec894d80a93c87fa5
trendmacro.pl
Posted Dec 6, 2002
Authored by deadbeat

Trendmacro is a ISVW V3.6 proxy bouncer and banner grabber in perl. Grabs HTTP banners through a proxy.

tags | tool, web, scanner, perl
systems | unix
MD5 | 8e0d76ff6a69dabe3b10ef1a74a87ef2
apachedos.pl
Posted Dec 6, 2002
Authored by deadbeat

Apache 1.3.xx / Tomcat server with mod_jk remote denial of service exploit which uses chunked encoding requests, as described in Qualys Security Advisory QSA-2002-12-04.

tags | remote, denial of service
MD5 | c7f85ed6f302d629522b05fc9cf22ba4
Oracle9iAS.dos.pl
Posted Oct 30, 2002
Authored by deadbeat

Oracle9iAS Web Cache Denial of Service exploit in perl, as described in Atstake advisory a102802-1.

tags | exploit, web, denial of service, perl
MD5 | 5587607f8f49ffd172b5844f93e01670
Page 1 of 1
Back1Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close