Exploit the possiblities
Showing 1 - 25 of 112 RSS Feed

Files from Kingcope

Email addresskingcope at gmx.net
First Active2004-04-11
Last Active2015-07-19
OpenSSH Two Minute Cracking Window
Posted Jul 19, 2015
Authored by Kingcope

OpenSSH allows for unlimited password cracking in a two minute timeframe.

tags | exploit
MD5 | 6295e312f1ac28b5f46eb3fe66a912b9
Apache Magicka Code Execution
Posted Oct 29, 2013
Authored by Kingcope

Apache and PHP remote command execution exploit that leverages php5-cgi.

tags | exploit, remote, cgi, php
advisories | CVE-2012-1823
MD5 | bdb5dbeddbd99bb47e41085bb02a8b97
ProFTPd mod_sftp / mod_sftp_pam Memory Exhaustion
Posted Sep 11, 2013
Authored by Kingcope

ProFTPd installs with mod_sftp and mod_sftp_pam activated contain a memory exhaustion vulnerability.

tags | advisory
MD5 | 21675316d25c79640552fa557ef64a5f
Mikrotik RouterOS 5.x / 6.x SSHd Heap Corruption
Posted Sep 3, 2013
Authored by Kingcope

Mikrotik RouterOS versions 5.x and 6.x suffer from an sshd remote pre-authentication heap corruption vulnerability. Included is a 50 meg Mikrotik package that includes all research items.

tags | exploit, remote
systems | linux
MD5 | 5573367c3fb2a92cbfdab5180446a3c0
Apache suEXEC Privilege Escalation / Information Disclosure
Posted Aug 8, 2013
Authored by Kingcope

Apache suEXEC suffers from privilege escalation and information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
MD5 | adfff8ba1d0a12b98212dd4354834db1
Nginx 1.3.9 / 1.4.0 Exploit Documentation
Posted Jul 23, 2013
Authored by Kingcope

This whitepaper document how the brute forcing exploit works for a buffer overflow vulnerability in nginx versions 1.3.9 and 1.4.0 on x86.

tags | paper, overflow, x86
advisories | CVE-2013-2028
MD5 | f28b004786a1a95ee6d162e27c74c651
Squid 3.3.5 Denial Of Service
Posted Jul 16, 2013
Authored by Kingcope

Squid version 3.3.5 remote denial of service crash exploit.

tags | exploit, remote, denial of service
MD5 | 388d844788ad94b3aba945ece2edc91d
nginx 1.3.9 / 1.4.0 x86 Brute Force Proof Of Concept
Posted Jul 11, 2013
Authored by Kingcope

nginx version 1.3.9 and 1.4.0 x86 brute force proof of concept remote exploit that spawns a reverse shell.

tags | exploit, remote, shell, x86, proof of concept
MD5 | f5ac447f659e479ba510b18b453f546b
Plesk PHP Code Injection
Posted Jun 25, 2013
Authored by Kingcope, infodox

Reliable exploit for the Plesk PHP code injection vulnerability disclosed by Kingcope in June 2013. Can deliver inline and reverse shells using the payloads library, as well as offering (buggy) file upload features.

tags | exploit, shell, php, file upload
systems | unix
MD5 | 40b90d76d0580f70886001e5bf3051b5
Parallels Plesk 9.5.4 Remote Command Execution
Posted Jun 5, 2013
Authored by Kingcope

Parallels Plesk version 9.5.4 (and possibly other versions) suffers from a remote PHP code execution vulnerability. This rar archive includes a working exploit and details surrounding the issue.

tags | exploit, remote, php, code execution
MD5 | b42829377d553f11639dc73af0e77a26
ircd-hybrid 8.0.5 Denial Of Service
Posted Apr 12, 2013
Authored by Kingcope

ircd-hybrid version 8.0.5 on CentOS 6 denial of service exploit.

tags | exploit, denial of service
systems | linux, centos
advisories | CVE-2013-0238
MD5 | 0f9fb041bdcef54322b9f2e40ce7695c
Attacking The Windows 7 / 8 Address Space Randomization
Posted Jan 25, 2013
Authored by Kingcope

This archive has a whitepaper that discusses research and methods used to circumvent Microsoft Windows 7 and 8 memory protections in order to execute arbitrary assembly code. Proof of concepts are also provided.

tags | exploit, arbitrary, proof of concept
systems | windows, 7
MD5 | f2dcb57fd42b4ac93de75561520e5cbb
IBM System Director Agent DLL Injection
Posted Dec 7, 2012
Authored by Kingcope, Bernhard Mueller, juan vazquez | Site metasploit.com

This Metasploit module abuses the "wmicimsv" service on IBM System Director Agent 5.20.3 to accomplish arbitrary DLL injection and execute arbitrary code with SYSTEM privileges. In order to accomplish remote DLL injection it uses a WebDAV service as disclosed by kingcope on December 2012. Because of this, the target host must have the WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically started by default on Windows XP SP3, but disabled by default on Windows 2003 SP2.

tags | exploit, remote, arbitrary
systems | windows, xp
advisories | CVE-2009-0880, OSVDB-52616, OSVDB-88102
MD5 | 1b5e33138c767b2b05228cc23a11ff0f
Oracle MySQL For Microsoft Windows MOF Execution
Posted Dec 7, 2012
Authored by Kingcope, sinn3r | Site metasploit.com

This Metasploit modules takes advantage of a file privilege misconfiguration problem specifically against Windows MySQL servers (due to the use of a .mof file). This may result in arbitrary code execution under the context of SYSTEM. However, please note in order to use this module, you must have a valid MySQL account on the target machine.

tags | exploit, arbitrary, code execution
systems | windows
advisories | CVE-2012-5613
MD5 | b018f0d01c159599ccc86e730647c227
Tectia SSH USERAUTH Change Request Password Reset
Posted Dec 5, 2012
Authored by Kingcope, sinn3r, bperry | Site metasploit.com

This Metasploit module exploits a vulnerability in Tectia SSH server for Unix-based platforms. The bug is caused by a SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ request before password authentication, allowing any remote user to bypass the login routine, and then gain access as root.

tags | exploit, remote, root
systems | unix
MD5 | 99b842280fc8ec78e6d006aec1abdf3a
FreeFTPD Remote SYSTEM Level
Posted Dec 3, 2012
Authored by Kingcope

FreeFTPD remote SYSTEM level exploit that does not require a username. All versions as of 12/03/2012 are affected.

tags | exploit, remote
MD5 | 1666d7ffaeb718a5eec487decd734a81
FreeSSHD Remote Authentication Bypass
Posted Dec 3, 2012
Authored by Kingcope

FreeSSHD suffers from a remote authentication bypass vulnerability.

tags | exploit, remote, bypass
MD5 | 4449a201e1dc674c050edb36d45792a4
SSH Tectia Remote Authentication Bypass
Posted Dec 3, 2012
Authored by Kingcope

The SSH USERAUTH CHANGE REQUEST routines in SSH Tectia (a commercial version of OpenSSH) suffer from a remote authentication bypass vulnerability.

tags | exploit, remote, bypass
MD5 | d1097c24946a6c69c7c5b8f41f926086
Telnet Encrypt Key ID Priv8 Scanner
Posted Dec 3, 2012
Authored by Kingcope, John Anderson

This is the telnet encrypt key id priv8 modified version of synscan.

tags | tool, scanner
systems | unix
MD5 | 984a700690a15f627353b8b10fe73215
Oracle MySQL User Account Enumeration Utility
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL suffers from a user enumeration vulnerability. This is a utility that demonstrates the issue.

tags | exploit
advisories | CVE-2012-5615
MD5 | 1f1d8075312eddb4eecfd8556cb24014
Oracle MySQL Windows Stuxnet Technique SYSTEM Exploit
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Windows remote exploit that leverages file privileges to obtain a SYSTEM shell.

tags | exploit, remote, shell
systems | windows
MD5 | c27279dbaad2797c961cf10a218675ee
Oracle MySQL 5.5.19-log Denial Of Service
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL version 5.5.19-log on SuSE Linux suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | linux, suse
advisories | CVE-2012-5614
MD5 | 42dabfd0d259adacd6ed7bb25e70ee3f
Oracle MySQL Privilege Escalation
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Linux suffers from a vulnerability that allows an attacker to add a new admin user.

tags | exploit
systems | linux
advisories | CVE-2012-5613
MD5 | a021c33c9e1f8d6bf9f971fdab61fac2
Oracle MySQL Heap Overrun
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL on Linux suffers from a heap overrun vulnerability.

tags | exploit, overflow
systems | linux
advisories | CVE-2012-5612
MD5 | a493a43ee46f04d6fb625c5bcdda36d2
Oracle MySQL Server 5.5.19-log Stack-Based Overrun
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL versions 5.5.19-log and below for Linux suffer from a stack-based overrun. This exploit yields a shell as the mysql uid.

tags | exploit, overflow, shell
systems | linux
advisories | CVE-2012-5611
MD5 | 89479fdd0c5de2e426d3dff292166a7b
Page 1 of 5
Back12345Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    15 Files
  • 22
    Nov 22nd
    23 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close