exploit the possibilities
Showing 1 - 20 of 20 RSS Feed

Files from Andres Tarasco

Email addressatarasco at gmail.com
First Active2003-11-25
Last Active2008-11-14
smbrelay3.zip
Posted Nov 14, 2008
Authored by Andres Tarasco | Site 514.es

SmbRelay3 is a proof of concept tool that is able to replay NTLM authentication from several protocols like SMB/HTTP/IMAP/etc.

tags | web, imap, protocol, proof of concept
MD5 | d764203437eff48fca628ba178318bb7
2007-MessageQueue.zip
Posted Dec 24, 2007
Authored by Andres Tarasco, Mario Ballano | Site 514.es

Microsoft Windows 2000 AS SP4 Message Queue exploit that takes advantage of the vulnerability noted in MS07-065.

tags | exploit
systems | windows, 2k
advisories | CVE-2007-3039
MD5 | d4a9641e4844b339993313f345494b11
fscan-both.tgz
Posted Jul 25, 2007
Authored by Andres Tarasco | Site 514.es

Fast HTTP Auth Scanner is a new web security scanner for Windows that allows brute-force attacks against web based devices that require HTTP authentication. Source and binary included.

tags | web
systems | windows
MD5 | adf7b4531948a7db469cf130dfd3ecf9
Microsoft_Dns_Server_Exploit.zip
Posted Apr 17, 2007
Authored by Andres Tarasco, Mario Ballano | Site 514.es

Microsoft DNS Server remote code execution exploit and analysis. This exploit works against TCP port 445. Tested against Windows 2000 server SP4 and Windows 2003 SP2. Binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp, code execution
systems | windows, 2k
advisories | CVE-2007-1748
MD5 | bf3b37514e4d4d9e3e243dbfd1747864
dnsfun.c
Posted Mar 24, 2007
Authored by Andres Tarasco | Site 514.es

Exploiting Microsoft DNS dynamic updates for fun and profit.

tags | exploit
MD5 | 6c4af2bef05d82e19d8cb3a3912fd004
Universal_printer_provider_exploit.zip
Posted Jan 30, 2007
Authored by Andres Tarasco | Site 514.es

Universal exploit for vulnerable EnumPrintersW() calls related to the spooler service. Allows code execution with SYSTEM privileges. Affected includes DiskAccess NFS Client (dapcnfsd.dll version 0.6.4.0), Citrix Metaframe - cpprov.dll, and Novell - nwspool.dll.

tags | exploit, code execution
advisories | CVE-2006-5854
MD5 | 7772176447738b443f1b8706a46460e0
NamedPipes.zip
Posted Oct 9, 2006
Authored by Andres Tarasco | Site 514.es

This tool allows you to impersonate user credentials (with namedpipes) and execute a shell. One of the best features of this tool is that it includes some new attack vectors (payload generator with -t parameter) to force network users to connect to a remote host (desktop.ini, html code, lnk files, url files,pps,) so smbrelay can also be used.

tags | remote, shell
MD5 | 390e81394206a7f20af432fe95663554
TokenExecution.zip
Posted Oct 9, 2006
Authored by Andres Tarasco | Site 514.es

This tool is able to duplicate all Tokens stored in the system by calling NtQuerySystemInformation(). Duplicated Tokens allow users with local Administrator rights to execute code with credentials of every user that is logged on to the system locally or over network. Default mode only extracts tokens from the lsass process.

tags | local
MD5 | b43f47d0201d27b9e9030a786b74014b
ProcessInjector.zip
Posted Oct 9, 2006
Authored by Andres Tarasco | Site 514.es

This tool enumerates all processes and threads running and shows their Token owner information. Users with SE_DEBUG_NAME privilege should be able to inject code on a local process and execute code with their privileges. This could be useful to obtain an interactive shell (at port 8080) when an user session is locked.

tags | shell, local
MD5 | e796f7eec43b81ff4b2e9868c808c48d
TibcoPasswordExtractor.c
Posted Sep 7, 2006
Authored by Andres Tarasco | Site 514.es

TIBCO RendezVous versions 7.4.11 and below local password extractor exploit.

tags | exploit, local
MD5 | 3ca032c8c903aa681f17fd3ad07c0b47
tibco_POC.c
Posted Sep 7, 2006
Authored by Andres Tarasco | Site 514.es

TIBCO RendezVous versions 7.4.11 and below remote buffer overflow proof of concept exploit for Win32.

tags | exploit, remote, overflow, proof of concept
systems | windows
MD5 | 2a6d0eee8828fee023939a3a92287c0d
srvcheck2.zip
Posted Feb 14, 2006
Authored by Andres Tarasco | Site haxorcitos.com

Privilege escalation exploit for Windows networks using weak service restrictions.

tags | exploit
systems | windows
MD5 | ad3eb5a3df759022d366d2a22d076536
minishell.zip
Posted Feb 14, 2006
Authored by Andres Tarasco, Miguel Tarasco Acuna | Site haxorcitos.com

Small bindshell (908 bytes for binary) for Windows compacted to 804 bytes with a little Headers modification. Both binary and Source code (VC++) included.

systems | windows
MD5 | e275e14e75886fcd4294ead4c4c1667b
RatBof.cpp
Posted May 27, 2005
Authored by Andres Tarasco, Miguel Tarasco Acuna | Site haxorcitos.com

Internet Explorer content advisor exploit that is related to MS05-020.

tags | exploit
MD5 | cf0ff753894931c20f3c60077a8bcacf
badblue-adv.txt
Posted Feb 28, 2005
Authored by Andres Tarasco

SIA has discovered a buffer overflow in EXT.DLL, a module that handles HTTP requests in BadBlue versions below 2.6.

tags | advisory, web, overflow
MD5 | 2430d6f3674e77544e7ba18d6c6ac2ee
badblue.cpp
Posted Feb 28, 2005
Authored by Andres Tarasco, Miguel

BadBlue webserver version 2.55 remote buffer overflow exploit. Tested under Windows 2000 Professional SP3/SP4 Spanish, Windows 2000 Server SP4 Spanish, and Windows XP SP1 Spanish.

tags | exploit, remote, overflow
systems | windows, 2k, xp
MD5 | 5529b72cb5a1e55ee5a545eee55e8adc
badblue25.c
Posted Feb 28, 2005
Authored by class101, Andres Tarasco | Site Hat-Squad.com

BadBlue webserver version 2.5 is susceptible to a remote buffer overflow vulnerability that allows for code execution. Full exploit provided.

tags | exploit, remote, overflow, code execution
MD5 | b199afc5574630ee6ece67c8d1c7d8af
rkdscan.zip
Posted Oct 26, 2004
Authored by Andres Tarasco | Site siainternational.com

Rkdscan is a scanner designed to detect whether or not an NT based computer is infected with the Hacker Defender root kit. To do this, it makes use of a design flaw.

tags | tool, root, scanner
systems | unix
MD5 | bb653a41e757b9762070bcd1ec082e5e
Fastream_advisory.txt
Posted Jul 4, 2004
Authored by Andres Tarasco | Site haxorcitos.com

Fastream NETFile FTP/Web Server versions 6.7.2.1085 and below suffer from input validation errors that allow malicious attackers to upload, create, and delete files in the application directory.

tags | advisory, web
MD5 | 0bc5c19825b962f630429ee2a59ce5a5
TCM315.txt
Posted Nov 25, 2003
Authored by Andres Tarasco

The embedded webserver for the Thomson TCM315 cable modem is vulnerable to a buffer overflow during a typical GET method HTTP request.

tags | exploit, web, overflow
MD5 | 51198bef948a30a3927152acb48c8e3f
Page 1 of 1
Back1Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    25 Files
  • 17
    Oct 17th
    17 Files
  • 18
    Oct 18th
    3 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close