exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Gyan Chawdhary

Email addressgyan.chawdhary at irmplc.com
First Active2003-09-18
Last Active2008-08-13
IOS_Connectback_v.1.0.txt
Posted Aug 13, 2008
Authored by Gyan Chawdhary | Site irmplc.com

Cisco IOS connectback shellcode that creates a new tty and sets the privilege level 15 and then connects back on port 21.

tags | shellcode
systems | cisco
SHA-256 | 7d7536d0f4ca415c80e65de21d25fef5ae8347250d1d27bf918e7129b54be89b
IOS_tiny_v.1.0.txt
Posted Aug 13, 2008
Authored by Gyan Chawdhary | Site irmplc.com

Cisco IOS tiny shellcode that creates a new tty and sets the privilege level 15.

tags | shellcode
systems | cisco
SHA-256 | 382805b63d61450f3bfac3b7092aa9452ac364ec3384116fdf99e7f630891f6e
Cisco_IOS_Exploitation_Techniques.pdf
Posted Jun 28, 2007
Authored by Gyan Chawdhary | Site irmplc.com

It has been more than a year since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a lot of media coverage in the security community, very little is known about the attack and the technical details surrounding the IOS check_heaps() vulnerability. This paper is a result of research carried out by IRM to analyze and understand the check_heaps() attack and its impact on similar embedded devices.

tags | paper, code execution
systems | cisco
SHA-256 | 40dd024bc2d874958a21e126057bd31b7ed7d0c86e440e3d7f7f5635a1c9819c
phpnolimit.c
Posted Dec 11, 2004
Authored by Gyan Chawdhary

Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.

tags | exploit, php
advisories | CVE-2004-0594
SHA-256 | 2c97cd1c958eda9cb6b3a5a97720fabb55603f0d0d23e1c106b84fb552ebbcfa
freedom.c
Posted Aug 12, 2004
Authored by Gyan Chawdhary

Remote CVS exploit for versions 1.11.15 and below that makes use of the Argumentx error_prog_name double free heap overflow on RedHat 8.0.

tags | exploit, remote, overflow
systems | linux, redhat
advisories | CVE-2004-0396
SHA-256 | 1ef0f00bc5dd2efbcfedccbeaf427ca4d38d3c2fcf5a2710c02762f6489148f1
subexp.c
Posted Jun 7, 2004
Authored by Gyan Chawdhary

Subversion 1.0.2 remote exploit that makes use of a stack overflow in the svn_time_from_cstring() function. Binds a shell to port 36864. Tested against RedHat 8.0 Psyche build.

tags | exploit, remote, overflow, shell
systems | linux, redhat
SHA-256 | d02b1feccebffc24878e8b25042a2f7c26807f4574998ffb926f8c0216c55f63
gyan_sendmail.c
Posted May 7, 2004
Authored by Gyan Chawdhary

Local root exploit for sendmail versions 8.12.9 and below that makes use of the prescan function vulnerability originally discovered by Michal Zalewski back in September.

tags | exploit, local, root
SHA-256 | 6b92118a7fe3130fa6ec45d888da04dc8d72dfd1264fed483ce66005c203ca9d
gyan_pine.c
Posted Sep 18, 2003
Authored by Gyan Chawdhary

Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here. Binds a shell to port 10000. Tested against RedHat Linux 7.0.

tags | exploit, remote, shell
systems | linux, redhat
SHA-256 | 902cb346d20aea5cb1ef62db8c36a27a7f7588fb1b62a8d42cc9f4c7751ba3f6
Page 1 of 1
Back1Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close