what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Carlos Barros

Email addressbarros at barrossecurity.com
First Active2004-10-19
Last Active2006-10-09
huk-0.1.tar.gz
Posted Oct 9, 2006
Authored by Carlos Barros | Site gotfault.net

Huk is a tool aimed to test password fragility using the brute-force method, multi-threaded and completely modular. The main difference for other tools is that Huk modules are compiled as "shared objects", what make it easy do develop and deploy new modules.

systems | unix
SHA-256 | 5fbddf2f3507d5e5c025652cd792ec1db42652af4e8408e8084b33dae818d648
ssheater-1.1.tar.gz
Posted Apr 6, 2006
Authored by Carlos Barros | Site gotfault.net

SSHeater is a program that infects the OpenSSH daemon in run-time in order to log all future sessions and implement a backdoor where a single password, chosen by the user, can log into all accounts in the system. There's a log parser included in the package that can display authentication information about sessions as well as play the session just like TTYrec/play.

tags | tool, rootkit
systems | unix
SHA-256 | ddc5f0ffbef955cabdf2fb58ed422c04a74622619744e0a7698ca94c6723c5ab
gexp-powerd.c
Posted Feb 14, 2006
Authored by Carlos Barros, xgc | Site gotfault.net

Power Daemon versions 2.0.2 and below remote format string exploit.

tags | exploit, remote
SHA-256 | 39a8b85e05a16b3857c96bcb51cc1ee38fd0e29b3cb64210d0c45b3de0471118
gexp-openvmpsd.c
Posted Feb 14, 2006
Authored by Carlos Barros, xgc | Site gotfault.net

OpenVMPSd versions 1.3 and below remote format string exploit. Binds a shell to port 31337.

tags | exploit, remote, shell
SHA-256 | 34c8403152d1b4997f141bd55afc9628f8378212a498478c212c889ec346fb10
qwik_fmtstr_xpl.c
Posted Nov 10, 2004
Authored by Carlos Barros | Site barrossecurity.com

qwik_smtpd remote root format string exploit.

tags | exploit, remote, root
SHA-256 | f80bcf5f7ebe8c8cf5fc157732f307ee79f84ec5b1e849586f565f4fb5b8fcc0
barrossecurity-mpg123-headerautht.txt
Posted Oct 19, 2004
Authored by Carlos Barros | Site barrossecurity.com

Advisory detailing header processing vulnerabilities in mpg123-0.59r, mpg123-pre0.59s. mpg123 is prone to a buffer overflow in the function getauthfromURL. It should be possible to use this to execute arbitrary code. The impact is minimal since you can normally only exploit this locally (though it may have more impact for internet radio sites, for example).

tags | advisory, overflow, arbitrary, vulnerability
SHA-256 | d36edfd63434893c10ef0e7a6442ce8e2b7d47ce08bce1e2e7f7574aec7c8310
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close