exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from jsk

First Active2003-09-29
Last Active2005-02-25
exwormshoutcast.c
Posted Feb 25, 2005
Authored by jsk

SHOUTcast version 1.9.4 remote exploit. Tested on RedHat 90 and Fedora 1. Has connectback shellcode.

tags | exploit, remote, shellcode
systems | linux, redhat, fedora
SHA-256 | 01fb25e458acea0e70572dfa7a4519ff1bba3f7699629b31e3eee8cdd497c6c9
cfengineRSA.c
Posted Feb 25, 2005
Authored by jsk

cfengine RSA remote heap overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 945ddc6e5642a02edd2bfd2623e328ef3b0dc1e69bd2da81c53810d911c2a07f
oseen_shoutcast.c
Posted Mar 4, 2004
Authored by jsk | Site oseen.org

SHOUTcast version 1.9.2 remote exploit with connect back code. Written for Slackware 8.1, 9.0, 9.1, and RedHat 7.2.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | 4871cfddef91c577c554b14dfdaf2472474b595033fe12ccb112b6a54d289e32
kill-Taidu.c
Posted Nov 25, 2003
Authored by jsk

webfs 1.7.x remote root exploit that binds a shell to port 26112 and makes use of a User-Agent buffer overflow.

tags | exploit, remote, overflow, shell, root
SHA-256 | b99a529cd0c9633b8757d0805ef4ef7815dc5ea637c2438a987d2ca956da300b
pserv.c
Posted Nov 17, 2003
Authored by jsk

pServ 2.0.x Beta webserver remote exploit that makes use of the User-Agent HTTP Header buffer overflow.

tags | exploit, remote, web, overflow
SHA-256 | 5c7a46786ee5ec0c5d78688145e1527fbd30b89d6df3a01b81f5ebb54be1a36d
mj-doc-vul.txt
Posted Oct 14, 2003
Authored by jsk

Ph4nt0m Security Advisory #2003-9-9 - mah-jong versions 1.6 and below are susceptible to a remote denial of service attack.

tags | advisory, remote, denial of service
SHA-256 | 9f7ebf87e359ccad366264bb0a277e015fb72bb0f3f9f57fae88ca20d2a63c19
cfengine.c
Posted Sep 29, 2003
Authored by jsk

Remote exploit for Cfengine versions 2.-2.0.3 that makes use of a stack overflow discussed here. Binds a shell to port 26112. Tested against RedHat.

tags | exploit, remote, overflow, shell
systems | linux, redhat
SHA-256 | 3d6399d602afc8e1234d04097ff5ebf01664d6980f11dcdde0306ddfc376b787
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close