what you don't know can hurt you
Showing 1 - 8 of 8 RSS Feed

Files from Gyan Chawdhary

Email addressgyan.chawdhary at irmplc.com
First Active2003-09-18
Last Active2008-08-13
IOS_Connectback_v.1.0.txt
Posted Aug 13, 2008
Authored by Gyan Chawdhary | Site irmplc.com

Cisco IOS connectback shellcode that creates a new tty and sets the privilege level 15 and then connects back on port 21.

tags | shellcode
systems | cisco
MD5 | fcc193d93dd1f6b99acd1094b69427f8
IOS_tiny_v.1.0.txt
Posted Aug 13, 2008
Authored by Gyan Chawdhary | Site irmplc.com

Cisco IOS tiny shellcode that creates a new tty and sets the privilege level 15.

tags | shellcode
systems | cisco
MD5 | 8b78fb32f92dc6c91c3b135d68f79e06
Cisco_IOS_Exploitation_Techniques.pdf
Posted Jun 28, 2007
Authored by Gyan Chawdhary | Site irmplc.com

It has been more than a year since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a lot of media coverage in the security community, very little is known about the attack and the technical details surrounding the IOS check_heaps() vulnerability. This paper is a result of research carried out by IRM to analyze and understand the check_heaps() attack and its impact on similar embedded devices.

tags | paper, code execution
systems | cisco
MD5 | de1e5098e579eb286a1dbc30729d80a5
phpnolimit.c
Posted Dec 11, 2004
Authored by Gyan Chawdhary

Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.

tags | exploit, php
advisories | CVE-2004-0594
MD5 | 7aadceaf9298a2f92f0e123e7baaf4af
freedom.c
Posted Aug 12, 2004
Authored by Gyan Chawdhary

Remote CVS exploit for versions 1.11.15 and below that makes use of the Argumentx error_prog_name double free heap overflow on RedHat 8.0.

tags | exploit, remote, overflow
systems | linux, redhat
advisories | CVE-2004-0396
MD5 | 45a646b9d1ea639efc598b6a5d0a9c1b
subexp.c
Posted Jun 7, 2004
Authored by Gyan Chawdhary

Subversion 1.0.2 remote exploit that makes use of a stack overflow in the svn_time_from_cstring() function. Binds a shell to port 36864. Tested against RedHat 8.0 Psyche build.

tags | exploit, remote, overflow, shell
systems | linux, redhat
MD5 | ba7bc719419799acd815ca5164cd3a69
gyan_sendmail.c
Posted May 7, 2004
Authored by Gyan Chawdhary

Local root exploit for sendmail versions 8.12.9 and below that makes use of the prescan function vulnerability originally discovered by Michal Zalewski back in September.

tags | exploit, local, root
MD5 | e6a94843ad03750d2f73beb8a33a7cdd
gyan_pine.c
Posted Sep 18, 2003
Authored by Gyan Chawdhary

Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here. Binds a shell to port 10000. Tested against RedHat Linux 7.0.

tags | exploit, remote, shell
systems | linux, redhat
MD5 | 2b5be512d212c9827dc8c6867ec28473
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close