what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files from Debasis Mohanty

Email addressd3basis.m0hanty at gmail.com
First Active2004-11-05
Last Active2008-11-16
ms08067-2k2k3.txt
Posted Nov 16, 2008
Authored by Debasis Mohanty | Site hackingspirits.com

Microsoft Windows Server Service code execution exploit that takes advantage of the vulnerability listed in MS08-067.

tags | exploit, code execution
systems | windows
SHA-256 | 43b4b06abdc9d1dc848be3b0b2df235bd5a1c33ca656f9b08764ada9e5b5ab7e
adobe-printf.txt
Posted Nov 6, 2008
Authored by Debasis Mohanty | Site hackingspirits.com

Adobe Reader Javascript printf buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell, javascript
advisories | CVE-2008-2992
SHA-256 | 1e213062186279cdaf0882da17b2e65180dd814cce5f690ea88450c1f8b75c9c
adwords-crlf-injection.pdf
Posted Dec 15, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

Multiple CRLF injection aka HTTP response splitting vulnerabilities have been identified in Google AdWords which may be exploited to inject arbitrary HTTP headers.

tags | exploit, web, arbitrary, vulnerability
SHA-256 | 062562a8590bce4277ad7237fb661cbe785c2f43af14a6b3863075554454d6bd
Shop-Script.txt
Posted Oct 27, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

Shop-Script suffers from multiple HTTP response splitting vulnerabilities. POC included.

tags | exploit, web, vulnerability
SHA-256 | 6d26cc8e33feba6e5ec461f5967a7deebc9b5bd0abb14de790021141377573fb
vuln-rnd.txt
Posted Jun 27, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

Malicious Flash files with explicit java scripts can be embedded within Excel spreadsheets using a "Shockwave Flash Object" which can be made to run once the file is opened by the user.

tags | advisory, java
SHA-256 | 5a7270e94904c8f983d1492db68f75bb9c93b353ea280930959f3a68958cfd1f
firenull.txt
Posted May 22, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

Firefox version 1.5.0.3 with IE Tab version 1.0.9 on Windows XP/2k suffers from a null pointer dereference bug.

tags | advisory
systems | windows
SHA-256 | cc0015c8a3dbf991cbe4abdd828b84520776ba42c305e028b8812cb6094baab5
google-reader.txt
Posted Apr 14, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

Google reader is supposed to display only those contents which the user has subscribed to however two vulnerabilities has been identified which may allow an attacker to entice it's victim (using google reader service) to view unwanted web contents carrying malicious payloads.

tags | advisory, web, vulnerability
SHA-256 | 7b5cfc8166efe4aad445c202f3c534911b697134b00dbe62e5e065872e8c800a
w3wp-remote-dos.zip
Posted Apr 6, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

w3wp remote DoS exploit due to improper reference of STA COM components in ASP.NET.

tags | exploit, remote, asp
SHA-256 | 012bbb7a3a8e236db1320cbab6d721129dda52a8403343cea4180f2a6ff96e14
w3wp-dos.txt
Posted Mar 23, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

It is possible to DOS the IIS Worker Process (w3wp) due to improper reference of STA COM components in ASP.NET. POC Exploit included.

tags | exploit, denial of service, asp
SHA-256 | 08835ab51fb255d6fe3eb1745d1e532f650748175084efc2259cda056de558dc
googleReader.txt
Posted Feb 26, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

Google reader is supposed to display only content that the user has subscribed to however two vulnerabilities has been identified which may allow an attacker to entice it's victim (using the Google reader service) to view unwanted web content carrying malicious payloads.

tags | advisory, web, vulnerability
SHA-256 | b1be74e59c96822e90d0d4e5c97dcb26b009d8564d84704e647d8be123188fd9
phpmychatBypass.txt
Posted Feb 25, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

PHPMyChat version 0.14.5 is susceptible to an authentication bypass flaw.

tags | advisory
SHA-256 | e21132e09686aa0b1fa8aa1535049e3fbce72cb2a85077b7d8d03ec406b83041
zone.labs-fw.txt
Posted Nov 8, 2005
Authored by Debasis Mohanty | Site hackingspirits.com

Zone Alarm products with Advance Program Control or OS Firewall Technology enabled, detects and blocks almost all APIs which are commonly used by malicious programs to send data via http by piggybacking over other trusted programs. However, it is still possible for a malicious programs to make outbound connections to the evil site by piggybacking over trusted Internet browser using "HTML Modal Dialog" in conjunction with simple JavaScript. POC code provided.

tags | advisory, web, javascript
SHA-256 | 6a46a2572af3dd1abd885d847dcf1d1d546bfc278f44b84cfbce2a5e7a3651eb
wga.txt
Posted Aug 14, 2005
Authored by Debasis Mohanty | Site hackingspirits.com

This proof of concept explains how Microsoft WGA validation check can be defeated and any Microsoft product with the WGA validation feature can be run and installed on machines running a pirated copy of Windows XP.

tags | advisory, proof of concept
systems | windows
SHA-256 | f0ce619089e25cac5ce67e00f1bbdd6bcafd35a9367e9e68693cf0d792c122b2
citiBypass.txt
Posted Aug 6, 2005
Authored by Debasis Mohanty | Site hackingspirits.com

Write up discussing a methodology to bypass Citibank Virtual Keyboard Protection, a mechanism to help protect against keyloggers and spyware.

tags | advisory
SHA-256 | 0bf50c337ec9fbe542418f18b4fc538ccfdf1b3d1c5af837b01094ce509c4ddd
ieCache.txt
Posted Dec 30, 2004
Authored by Debasis Mohanty | Site hackingspirits.com

When IE is configured to access internet using proxy, the user's authentication details are cached locally without IE prompting the user. Even though the 'save my password' option is not checked, the user's proxy authentication details are cached locally without the user's knowledge.

tags | advisory
SHA-256 | 0afdaa1201b34beaf9de9a6ea3a190f4c9ef2424ffe6f9567f5212528e587cb3
msISAauthbypass.txt
Posted Nov 5, 2004
Authored by Debasis Mohanty | Site hackingspirits.com

Methods exist to allow for Microsoft ISA authentication bypass when the server is configured as a proxy.

tags | advisory
SHA-256 | 20d67b32faeaa9d4c6a6633a67f0bc202a0ca8b8aa5ad2d7669d258aff6babcc
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close