what you don't know can hurt you
Showing 1 - 6 of 6 RSS Feed

Files from Carlos Barros

Email addressbarros at barrossecurity.com
First Active2004-10-19
Last Active2006-10-09
huk-0.1.tar.gz
Posted Oct 9, 2006
Authored by Carlos Barros | Site gotfault.net

Huk is a tool aimed to test password fragility using the brute-force method, multi-threaded and completely modular. The main difference for other tools is that Huk modules are compiled as "shared objects", what make it easy do develop and deploy new modules.

systems | unix
MD5 | e7d34ede97d64d3d430e49b9e45eae5e
ssheater-1.1.tar.gz
Posted Apr 6, 2006
Authored by Carlos Barros | Site gotfault.net

SSHeater is a program that infects the OpenSSH daemon in run-time in order to log all future sessions and implement a backdoor where a single password, chosen by the user, can log into all accounts in the system. There's a log parser included in the package that can display authentication information about sessions as well as play the session just like TTYrec/play.

tags | tool, rootkit
systems | unix
MD5 | 584353ff41ac6ad6a59f87eaa8b05340
gexp-powerd.c
Posted Feb 14, 2006
Authored by Carlos Barros, xgc | Site gotfault.net

Power Daemon versions 2.0.2 and below remote format string exploit.

tags | exploit, remote
MD5 | bf56b8e1706fc8e7b5799af013ff3a49
gexp-openvmpsd.c
Posted Feb 14, 2006
Authored by Carlos Barros, xgc | Site gotfault.net

OpenVMPSd versions 1.3 and below remote format string exploit. Binds a shell to port 31337.

tags | exploit, remote, shell
MD5 | 9c0d6272bd7bf0b699a00bbb8cac7440
qwik_fmtstr_xpl.c
Posted Nov 10, 2004
Authored by Carlos Barros | Site barrossecurity.com

qwik_smtpd remote root format string exploit.

tags | exploit, remote, root
MD5 | 7f49b64e48f0b748c872b5bfcf26825d
barrossecurity-mpg123-headerautht.txt
Posted Oct 19, 2004
Authored by Carlos Barros | Site barrossecurity.com

Advisory detailing header processing vulnerabilities in mpg123-0.59r, mpg123-pre0.59s. mpg123 is prone to a buffer overflow in the function getauthfromURL. It should be possible to use this to execute arbitrary code. The impact is minimal since you can normally only exploit this locally (though it may have more impact for internet radio sites, for example).

tags | advisory, overflow, arbitrary, vulnerability
MD5 | cd661071e9bc6dbadb6ce499eea32540
Page 1 of 1
Back1Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close