what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Carlos Barros

Email addressbarros at barrossecurity.com
First Active2004-10-19
Last Active2006-10-09
huk-0.1.tar.gz
Posted Oct 9, 2006
Authored by Carlos Barros | Site gotfault.net

Huk is a tool aimed to test password fragility using the brute-force method, multi-threaded and completely modular. The main difference for other tools is that Huk modules are compiled as "shared objects", what make it easy do develop and deploy new modules.

systems | unix
SHA-256 | 5fbddf2f3507d5e5c025652cd792ec1db42652af4e8408e8084b33dae818d648
ssheater-1.1.tar.gz
Posted Apr 6, 2006
Authored by Carlos Barros | Site gotfault.net

SSHeater is a program that infects the OpenSSH daemon in run-time in order to log all future sessions and implement a backdoor where a single password, chosen by the user, can log into all accounts in the system. There's a log parser included in the package that can display authentication information about sessions as well as play the session just like TTYrec/play.

tags | tool, rootkit
systems | unix
SHA-256 | ddc5f0ffbef955cabdf2fb58ed422c04a74622619744e0a7698ca94c6723c5ab
gexp-powerd.c
Posted Feb 14, 2006
Authored by Carlos Barros, xgc | Site gotfault.net

Power Daemon versions 2.0.2 and below remote format string exploit.

tags | exploit, remote
SHA-256 | 39a8b85e05a16b3857c96bcb51cc1ee38fd0e29b3cb64210d0c45b3de0471118
gexp-openvmpsd.c
Posted Feb 14, 2006
Authored by Carlos Barros, xgc | Site gotfault.net

OpenVMPSd versions 1.3 and below remote format string exploit. Binds a shell to port 31337.

tags | exploit, remote, shell
SHA-256 | 34c8403152d1b4997f141bd55afc9628f8378212a498478c212c889ec346fb10
qwik_fmtstr_xpl.c
Posted Nov 10, 2004
Authored by Carlos Barros | Site barrossecurity.com

qwik_smtpd remote root format string exploit.

tags | exploit, remote, root
SHA-256 | f80bcf5f7ebe8c8cf5fc157732f307ee79f84ec5b1e849586f565f4fb5b8fcc0
barrossecurity-mpg123-headerautht.txt
Posted Oct 19, 2004
Authored by Carlos Barros | Site barrossecurity.com

Advisory detailing header processing vulnerabilities in mpg123-0.59r, mpg123-pre0.59s. mpg123 is prone to a buffer overflow in the function getauthfromURL. It should be possible to use this to execute arbitrary code. The impact is minimal since you can normally only exploit this locally (though it may have more impact for internet radio sites, for example).

tags | advisory, overflow, arbitrary, vulnerability
SHA-256 | d36edfd63434893c10ef0e7a6442ce8e2b7d47ce08bce1e2e7f7574aec7c8310
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close