what you don't know can hurt you
Showing 1 - 20 of 20 RSS Feed

Files from class101

Email addressclass101 at hat-squad.com
First Active2003-08-16
Last Active2005-05-27
HS_WINS.cpp
Posted May 27, 2005
Authored by class101 | Site class101.org

Microsoft WINS remote operating system and service pack scanner.

tags | exploit, remote
MD5 | 739132900a7a83429858f19d37409e1b
101_WINS.cpp
Posted Apr 18, 2005
Authored by class101 | Site hat-squad.com

Remote heap buffer overflow exploit for the Microsoft Windows Internet Name Service. Tested against Win2k SP4 Advanced Server English. This exploit can bind a shell to port 101 or will reverse a cmd shell back to a listener.

tags | exploit, remote, overflow, shell
systems | windows, 2k
MD5 | b08e8dd6c1b44ec43827c25a4d9c7598
netv-remhbof.c
Posted Apr 14, 2005
Authored by class101 | Site hat-squad.com

BakBone NetVault versions 6.x and 7.x remote heap buffer overflow exploit. Binds a shell to port 101 and can also shuffle a reverse shell back.

tags | exploit, remote, overflow, shell
MD5 | 85a5a5f0dc7a870e723ef858c4841141
netv-locsbof.c
Posted Apr 14, 2005
Authored by class101 | Site hat-squad.com

BakBone NetVault versions 6.x and 7.x configure.cfg local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | bc67dbb5e71ab675b5bbdc5fcc0263da
bakboneOverflows.txt
Posted Apr 14, 2005
Authored by class101 | Site hat-squad.com

BakBone NetVault versions 7.x and 6.x are susceptible to remote heap and local buffer overflows.

tags | advisory, remote, overflow, local
MD5 | 7b2b0b4ab923c9881e3cc18e4b34f42f
101_SentLM.cpp
Posted Mar 17, 2005
Authored by class101 | Site hat-squad.com

Sentinel License Manager version 7.2.0.2 exploit that makes use of stack overflow in the License service on UDP 5093.

tags | exploit, overflow, udp
MD5 | 537bb287afdded57683f1d71fe7707af
101_cali.c
Posted Mar 12, 2005
Authored by class101 | Site class101.org

This exploit takes advantage of a stack overflow vulnerability in the CA License Server network service. Versions 1.61 and below are susceptible.

tags | exploit, overflow
advisories | CVE-2005-0581
MD5 | 1c41bb753f9fbfaceacd948f79cb654b
badblue25.c
Posted Feb 28, 2005
Authored by class101, Andres Tarasco | Site Hat-Squad.com

BadBlue webserver version 2.5 is susceptible to a remote buffer overflow vulnerability that allows for code execution. Full exploit provided.

tags | exploit, remote, overflow, code execution
MD5 | b199afc5574630ee6ece67c8d1c7d8af
3CDaemon.c
Posted Feb 25, 2005
Authored by class101 | Site class101.org

3com 3CDaemon FTP unauthorized USER remote buffer overflow exploit that can bind a shell or reverse a shell back to a listener.

tags | exploit, remote, overflow, shell
MD5 | c3fed19b473c2219a2699220fa4e4a31
findjmp2.c
Posted Feb 18, 2005
Authored by class101 | Site Hat-Squad.com

Findjmp2.c is a tool which scans for call/jmp/pushret offsets, and logs to a file. This is a modified version of the Eeye tool Findjmp.

systems | unix
MD5 | 90acf8d9be091b8da5504ce5fc63e0e1
veritasABS.c
Posted Jan 12, 2005
Authored by class101

Remote stack overflow exploit for Veritas Backup Exec. Works for versions 9.1.4691.SP1, 9.1.4691.SP0, and 8.5.3572. Allows for a shell to be bound to port 101 or it spawn a reverse shell as well.

tags | exploit, remote, overflow, shell
advisories | CVE-2004-1172
MD5 | 72015033c9e98600771603805897d0be
netcat-exp.txt
Posted Jan 2, 2005
Authored by class101

A buffer overflow in netcat can allow for remote compromise. Full exploit provided.

tags | exploit, remote, overflow
MD5 | a2b6b784698e602e8fb3cea8f8d99e58
000102advisory.txt
Posted Dec 11, 2004
Authored by class101, Nima Majidi, idespinner | Site hat-squad.com

MailEnable Professional Edition version 1.52 and MailEnable Enterprise Edition version 1.01 both suffer from a remote buffer overflow in their IMAP service. Full exploit included.

tags | exploit, remote, overflow, imap
MD5 | 102445417417101b51b8c9f52b3d0bd8
101_netn.cpp
Posted Nov 13, 2004
Authored by class101

NetNote Server version 2.2 build 230 crafted string vulnerability exploit that crashes the server.

tags | exploit
MD5 | 2471da94acdd22918c6bdbee201e68f4
101_slim.cpp
Posted Nov 12, 2004
Authored by class101

Remote buffer overflow exploit for SlimFTPd versions 3.15 and below. Binds a shell to port 101.

tags | exploit, remote, overflow, shell
MD5 | 3bd529c381a9d88fc5ed46d54c552c88
101_mini.cpp
Posted Nov 10, 2004
Authored by class101

Minishare versions 1.4.1 and below remote buffer overflow exploit that binds a shell to port 101.

tags | exploit, remote, overflow, shell
MD5 | 470aaf255d5cecbac310c94088f9fe4f
101_shixx.cpp
Posted Oct 23, 2004
Authored by class101 | Site dfind.kd-team.com

Remote buffer overflow exploit for ShixxNote 6.net, which, according to the producers site, is "a personal organizer, desktop sticky notes (post-it) program, instant messaging application (LAN messanger) and a communications tool used across a local network (Intranet), Internet and via email. Perfect and ideal tool for your LAN or office communication." The exploit works against Win2k only, it will crash other platforms.

tags | exploit, remote, overflow, local
systems | windows
MD5 | bfc9fbad540e7cb9c5659b33bb662ecb
101_ypops.cpp
Posted Oct 13, 2004
Authored by class101, Behrang Fouladi

YahooPOPS version 1.6 and prior SMTP port buffer overflow exploit version 0.1. Binds a shell to port 101.

tags | exploit, overflow, shell
MD5 | 0d5056eaf4d9cdc2944e37a93bdd4e78
rpcdcom101.zip
Posted Aug 19, 2003
Authored by class101

DCOM remote exploit for the Win32 platform utilizing the issue discussed here. This version has 73 offsets including all of the magical offsets.

tags | exploit, remote
systems | windows
MD5 | e829bf97060988fe1b81bc6aa8362a57
nfm-shatterdame.zip
Posted Aug 16, 2003
Authored by ash, xenophile, class101

DameWare Mini Remote Control Server version 3.71.0.0 and below remote exploit that takes advantage of a shatter style attack.

tags | exploit, remote
MD5 | 72ed2f0b3d6137c5be7a0174c2558259
Page 1 of 1
Back1Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    12 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close