seeing is believing
Showing 1 - 14 of 14 RSS Feed

Files from Efrain Torres

Email addresset at cyberspace.org
First Active1999-08-17
Last Active2009-11-26
WS-FTP Server 5.03 MKD Overflow
Posted Nov 26, 2009
Authored by Efrain Torres, Reed Arvin | Site metasploit.com

This Metasploit module exploits the buffer overflow found in the MKD command in IPSWITCH WS_FTP Server 5.03 discovered by Reed Arvin.

tags | exploit, overflow
advisories | CVE-2004-1135
MD5 | 539d9fbaf6a97b6b59263a8a01f93ef5
NotmuchG.pl.txt
Posted Oct 13, 2004
Authored by Efrain Torres

Perl exploit for IPSwitch WhatsUp Gold version 8.03 that is susceptible to a remote buffer overflow. Tested on Win2k SP4. Successful exploitation binds a shell on port 28876.

tags | exploit, remote, overflow, shell, perl
systems | windows
MD5 | 0c39361862f209e73e6107bf06e50093
ShatterMaster.zip
Posted Aug 5, 2003
Authored by Efrain Torres

Shatter Master is a win32 program made in VB6 to develop and exploit shatter attacks in Windows NT/2k/XP. Related information available here.

systems | windows, nt, 32
MD5 | 30bb20752a2c7e1dc0ddf8f896c4b115
wmap1.3.tar.gz
Posted Dec 29, 2002
Authored by Efrain Torres | Site pwp.007mundo.com

Wmap v1.3 is a cgi scanner that attempts to be smarter than most. To increase the chance of finding useful stuff, wmap has a file containing interesting Directories (dirs.db) and other file containing common cgi dirs (dircgis.db) to search for. If a directory is found is added to the test. This include all the directories that are found in the html tags. For each directory found, not only scans for vulnerable CGI's (cgis.db) it scan for interesting files (ex. passwords.tmp) included in the file (file.db) and does an http PUT scan.

Changes: Many bug fixes.
tags | web, cgi
systems | unix
MD5 | c6ea4d3cb5c9499182cb736b26942b2c
wmap1.2.tar.gz
Posted Feb 19, 2002
Authored by Efrain Torres | Site pwp.007mundo.com

Wmap v1.2 is a cgi scanner that attempts to be smarter than most. To increase the chance of finding useful stuff, wmap has a file containing interesting Directories (dirs.db) and other file containing common cgi dirs (dircgis.db) to search for. If a directory is found is added to the test. This include all the directories that are found in the html tags. For each directory found, not only scans for vulnerable CGI's (cgis.db) it scan for interesting files (ex. passwords.tmp) included in the file (file.db) and does an http PUT scan.

tags | web, cgi
systems | unix
MD5 | db909b7bb866f015d9152671a46a299f
snoop.servlet.txt
Posted Jul 20, 2000
Authored by Efrain Torres, lownoise

The Snoop Servlet on Release Build 3.1 and 3.0 of Tomcat from Apache Software Foundation reveals the full path to the webserver and OS.

tags | exploit
MD5 | 9c79e1c0a5932d99efb8838bf96e6584
tomcat-3.1.path.txt
Posted Jul 20, 2000
Authored by Efrain Torres, lownoise

Tomcat v3.1 from the Apache Software Foundation displays the full path of the web server.

tags | exploit, web
MD5 | de75c83927b64b063866cc4878105a5f
ismyasp.pl
Posted May 15, 2000
Authored by Efrain Torres, lownoise

LoWNOISE - ISMyASP - IIS ASP source code viewer using the ISM.DLL buffer truncation bug.

tags | exploit, asp
MD5 | 74e5c0d4d4d617d23fa8caadb98437f5
rightfax.txt
Posted Feb 1, 2000
Authored by Efrain Torres, lownoise

RightFax Web Client v5.2 allows anyone to hijack user's faxes.

tags | exploit, web
MD5 | 9bb7293d5c68e1a5c5585199bad613a5
sslcrack.zip
Posted Nov 15, 1999
Authored by Efrain Torres, lownoise

sslcrack is a basic VB5 win9x brute force PIN SSL cracker. Zip includes HomeBanking.txt, which explains a common weakness in Home Banking systems that allows brute forcing the PIN.

systems | windows
MD5 | fadf78f286a4e7e5b2282305a32b401d
menu2eng.txt
Posted Aug 17, 1999
Authored by Efrain Torres, lownoise

How To Break Out of Restricted Shells and Menus, v2.3 - An excellent whitepaper detailing methods for breaking out of virtually any kind of restricted shell or menu you might come across.

tags | paper, shell
MD5 | e7db43e9f3adcfb3393a5bbaff02f40f
PADLOCK.txt
Posted Aug 17, 1999
Authored by Efrain Torres

PADLOCK-IT v1.01 contains numerous security holes and improperly manages passwords, making for a very unsecure implementation of the Twofish encryption algorithm.

tags | exploit
MD5 | 58e106a995548c3122f4f31a2d6de181
lowkill21.zip
Posted Aug 17, 1999
Authored by Efrain Torres, lownoise

LoWKILL 2.1 is a Windows9x/NT port of the modem escape character Denial of Service exploit (+++ATHO). Designed for a user-friendly, low-quality, low-performance enviroment, LoWKILL 2.1 allows you to target entire subnets and select custom escape character sequences to kill Internet connections remotely.

tags | exploit, denial of service
MD5 | b956732203019bf6fd9e1800177f4f49
padlock-it.txt
Posted Aug 17, 1999
Authored by Efrain Torres, lownoise

The password protection program PADLOCK-IT Version 1.01 does not properly implement the TwoFish encryption used, rendering both the encryption algorithm and the software program security meaningless.

tags | exploit
MD5 | 06070ea89646e2327e75582a1a5ea840
Page 1 of 1
Back1Next

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close