Exploit the possiblities
Showing 1 - 24 of 24 RSS Feed

Files from Reed Arvin

Email addressreedarvin at gmail.com
First Active2004-11-20
Last Active2010-01-05
How To Do Windows Account Password Guessing With WinScanX
Posted Jan 5, 2010
Authored by Reed Arvin | Site windowsaudit.com

Small write up describing how to do windows account password guessing using the WinScanX tool.

tags | paper
systems | windows
MD5 | 3677f4cfe39458958727056c89ed3cab
WinScanX Password Utility
Posted Dec 22, 2009
Authored by Reed Arvin | Site windowsaudit.com

WinScanX is a Windows enumeration utility featuring over 20 options including the ability to identify easy-to-guess Windows passwords, the ability to identify easy-to-guess SNMP community strings, and the ability to locate and decrypt WinVNC passwords. Includes an optional GUI front-end.

systems | windows
MD5 | 46f9d4769513714550c3368066a2122d
WS-FTP Server 5.03 MKD Overflow
Posted Nov 26, 2009
Authored by Efrain Torres, Reed Arvin | Site metasploit.com

This Metasploit module exploits the buffer overflow found in the MKD command in IPSWITCH WS_FTP Server 5.03 discovered by Reed Arvin.

tags | exploit, overflow
advisories | CVE-2004-1135
MD5 | 539d9fbaf6a97b6b59263a8a01f93ef5
PWDumpX11.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX version 1.1 allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

tags | remote, web, local, cracker
systems | windows
MD5 | 140b40e3635fb56a786ab8999da31c41
PWDumpX.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

The PWDumpX tool allows a user with administrative privileges to retrieve the encrypted password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems.

tags | remote, local, cracker
systems | windows
MD5 | 06b38b744b02dac47976b3b5671c1331
PWDumpX14.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

Changes: Now dumps domain password cache (if available), LSA secrets, password hashes, and password history hashes (if available).
tags | remote, web, local, cracker
systems | windows
MD5 | aca17d904f3995dc0953bf435d399be2
NBTEnum33.zip
Posted Nov 29, 2006
Authored by Reed Arvin | Site reedarvin.thearvins.com

NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included.

Changes: Bug fixes. Completely rewritten RestrictAnonymous bypass routine. Included source code for educational purposes.
tags | local, perl
systems | windows, nt
MD5 | 807fcb02ec2c5f28c6c5f3380dd063f3
18ZLZA.txt
Posted Mar 9, 2006
Authored by Reed Arvin | Site reedarvin.thearvins.com

18 ways to escalate privileges in Zone Labs ZoneAlarm Security Suite build 6.1.744.000.

tags | exploit
MD5 | 4f373b619e885de89d6a5fa69001183d
VirusScanEnterprise8.0i.txt
Posted Dec 28, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5) suffer from a privilege escalation vulnerability in the naPrdMgr.exe program. POC provided.

tags | advisory
MD5 | ea4eef506046f0eda7a4cf6dc4ab191f
NAePolicy.txt
Posted Aug 12, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

A privilege escalation flaw exists in Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3). Exploitation details provided.

tags | exploit
MD5 | 3ca0a4e98d960f6e2e41e2b844bed4f7
linksysWLAN20.txt
Posted Aug 11, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

The Linksys WLAN Monitor service (WLSVC) that is used to configure settings for various Linksys wireless network cards runs under the context of the LocalSystem account. It is possible to manipulate the administrative interface of the Linksys WLAN Monitor and escalate privileges to that of the LocalSystem account. Linksys WLAN Monitor version 2.0 is susceptible.

tags | exploit
MD5 | 880c6418dd76abab4214c0e9146f60e3
BusMail_SMTPDOS.pl.txt
Posted Aug 5, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

A buffer overflow in BusinessMail email server system 4.60.00 allows for a denial of service attack. Proof of concept exploit included.

tags | exploit, denial of service, overflow, proof of concept
MD5 | f3fa06fa76a7d8c2d9706b6e4b130403
FTPshellDoS.txt
Posted Jul 28, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

Logging into FTPshell server version 3.38 will cause the ftpshelld.exe process to die, resulting in a denial of service.

tags | exploit, denial of service
MD5 | ac2ac8e4a10f4136e3188793d8eb0872
Infradig60.txt
Posted Jul 1, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

Infradig Systems Inframail Advantage Server Edition 6.0 suffers from multiple buffer overflows. Sample denial of service exploits included.

tags | exploit, denial of service, overflow
MD5 | 9ffd0b4310c54c96ad38236984614c66
IAeMailServer_DOS.pl.txt
Posted Jun 29, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

A denial of service vulnerability exists in the True North Software IA eMailServer Corporate Edition version 5.2.2. Build: 1051. Input to the IMAP4 LIST command is not properly checked. Perl exploit provided.

tags | exploit, denial of service, perl
MD5 | 49463a1e24a79a951d044d3dadaa0090
KMiNT21.txt
Posted Jun 23, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

A buffer overflow exists in KMiNT21 Software Golden FTP Server Pro version 2.52.

tags | exploit, overflow
MD5 | bf3a9374bdef6708f95745e2dd16bd8f
goodtechDoS.txt
Posted Jun 20, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

GoodTech SMTP Server for Windows NT/2000/XP version 5.14 is susceptible to a denial of service vulnerability.

tags | exploit, denial of service
systems | windows, nt
MD5 | 865e9cb2d4c6232438f6ab88a1e22c39
BulletProof.c
Posted May 27, 2005
Authored by Jerome Athias, Reed Arvin | Site reedarvin.thearvins.com

BulletProof FTP server version 2.4.0.31 local privilege escalation exploit that provides a shell with SYSTEM privileges.

tags | exploit, shell, local
MD5 | cc4e2b6ca245131b55750aabff2e0ebe
mercury_adv.txt
Posted Dec 12, 2004
Authored by Reed Arvin

Multiple buffer overflows exist in Mercury/32, version 4.01a, Dec 8 2003. There are 14 vulnerable commands that can be used to cause buffer overflows to occur. After a successful login to the mail server, if any of these commands are used with an overly long argument the application closes resulting in a denial of service.

tags | advisory, denial of service, overflow
MD5 | ac1ce8217842af8d95151fefd0ddf700
wsftp503.txt
Posted Dec 11, 2004
Authored by Reed Arvin

Multiple buffer overflows exist in WS_FTP Server Version 5.03, 2004.10.14. There are four vulnerable commands that can be used to cause these buffer overflows. Three of the vulnerable commands can be used to stop the WS_FTP Server service resulting in a denial of service. The vulnerable commands are SITE, XMKD, MKD, and RNFR.

tags | advisory, denial of service, overflow
MD5 | 8965bc3c144815e73d70ee13c356263a
mdaemon72.txt
Posted Dec 11, 2004
Authored by Reed Arvin

A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.

tags | exploit, local
MD5 | ab98079c7abf569bb92b4d337713545b
aclient.txt
Posted Nov 20, 2004
Authored by Reed Arvin

Altiris Deployment Solution 5.6 SP1 (Hotfix E) suffers from a privilege escalation flaw that allows for SYSTEM level access. Step by step exploitation given.

tags | exploit
MD5 | 1be9fdc191a6ebdcdd6f90985f998910
mailtraq.txt
Posted Nov 20, 2004
Authored by Reed Arvin

A privilege escalation technique can be used to gain SYSTEM level access while using the Mailtraq administration console. Mailtraq Version 2.6.1.1677 is vulnerable.

tags | exploit
MD5 | 570f63e06a088944b32ac1db1e0bb12f
dmsPOP3.txt
Posted Nov 20, 2004
Authored by Reed Arvin

A buffer overflow exists in DMS POP3 Server for Windows 2000/XP 1.5.3 build 37 and prior versions. Demonstration exploit included.

tags | exploit, overflow
systems | windows, 2k
MD5 | d0b5cdae27042d688d59e55c6e8046ac
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close