exploit the possibilities
Showing 1 - 21 of 21 RSS Feed

Files from stealth

Email addressstealth at segfault.net
First Active1999-08-17
Last Active2017-05-23
KDE 4/5 KAuth Privilege Escalation
Posted May 23, 2017
Authored by stealth

KDE versions 4 and 5 suffer from a KAuth privilege escalation vulnerability.

tags | exploit
advisories | CVE-2017-8422, CVE-2017-8849
MD5 | 528f084d337783d989b2aea23435410c
vBulletin 5b SQL Injection
Posted May 23, 2013
Authored by stealth, UberLame | Site zempirians.com

This is an SQL Injection proof of concept that will display information about the vBulletin software and the admin details from the database. It can be adjusted to read any part of the database.

tags | exploit, sql injection, proof of concept
MD5 | cb04d038aff6ab2f0eb48a57ef230a2e
7350ssharp-0.51.tgz
Posted Jun 25, 2004
Authored by teso, stealth | Site stealth.openwall.net

ssharp is a tool for man in the middle attacks against SSH.

MD5 | 8e8771914abfa95f80ea1fd9a7539c45
adore-ng-0.41.tgz
Posted Mar 12, 2004
Authored by teso, stealth | Site team-teso.net

Adore is a Linux LKM based rootkit for Linux v2.[246]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Ported to 2.6 and fixed a buffer overflow from version 0.32.
systems | linux
MD5 | 3295d45f24060914c411d1d75343660a
adore-ng-0.31.tgz
Posted Jan 6, 2004
Authored by teso, stealth | Site team-teso.net

Adore is a Linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Syslog filtering, wtmp/utmp/lastlog filtering, relinking of LKMs as described in Phrack #61.
systems | linux
MD5 | 4a925181db7030c1e9b67225a88abbe0
adore-0.42.tgz
Posted Sep 19, 2002
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added devpts fix, fixed is_secret64() to properly hide files, and fixed a memory leak.
systems | linux
MD5 | 156ded13d5e16b84a9e31193bc9bc417
adore-0.39b4.tgz
Posted Jul 29, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Now includes open()/stat() redirection and improved netstat hiding. Removed execution redirection.
systems | linux
MD5 | 777cbd2a59268b394b79da2bda910a40
adore-0.38.tar.gz
Posted May 25, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added 64bit FS support, now fools protection modules as StMichael, and minor fixes.
systems | linux
MD5 | 72e80f9fa6ebe9358f7fd0358c8e959f
adore-0.34.tgz
Posted Mar 27, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved 2.4 support, better authentication checking, permanent PID removal, configure script, experimental exec redirection for i386.
systems | linux
MD5 | 69b3453f1fb1650388fc63297652d221
adore-0.31.tar.gz
Posted Jan 9, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Automatic configuration, bug fixes.
systems | linux
MD5 | 4bdf75cfb7735741285ae82f5b5d4df6
teso-advisory-010.tar.gz
Posted May 31, 2000
Authored by teso, stealth | Site team-teso.net

TESO Security Advisory #10 - KDE KApplication {} configfile vulnerability. Due to insecure creation of configuration files via KApplication-class, local lusers can create arbitrary files when running setuid root KDE-programs. Tested with SuSE 6.4 standard installation under KDE 1.1.2.

tags | exploit, arbitrary, local, root
systems | linux, suse
MD5 | 6103db5015829edfd04b3e38410f29e5
imexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween 4 local root exploit for imwheel-solo. Other distros maybe affected as well.

tags | exploit, local, root
MD5 | c3666f47df53ac801b0213bec8395af0
wmexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween Linux 4.0 and Debian Linux 2.1 local root exploit for wmcdplay. Other distros are maybe affected as well.

tags | exploit, local, root
systems | linux, debian
MD5 | f9d6741dc3c813e80a88184bdbabf44e
hellkit-1.2.tar.gz
Posted Mar 16, 2000
Authored by teso, stealth | Site team-teso.net

Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Many examples included.

Changes: Added generic shellcode decoder which can handle shellcode up to 64kb in length containing any bytes, added encoder for this type of decoder, and fixed some signedness issues in array accessment.
tags | overflow, shellcode
MD5 | 1dfa21f029e4fbc903c92734cfe98ca4
adore-0.14.tar.gz
Posted Feb 22, 2000
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved promisc hiding, port hiding fixed, and a readme.
systems | linux
MD5 | 3879c8ab46ebf72dc61bf267ea1f00a2
hellkit-1.1.tar.gz
Posted Feb 15, 2000
Authored by teso, stealth | Site team-teso.net

Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Examples included.

tags | overflow, shellcode
MD5 | 2a288b645f90c951843fed37ad797345
adore-0.13.tar.gz
Posted Feb 15, 2000
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

systems | linux
MD5 | 5b247f2588a6e476135954c220aba95c
icmp-0.9.tar.gz
Posted Aug 17, 1999
Authored by stealth

IMON v0.9b is a powerful tool to monitor/analyze ICMP traffic on your LAN (includes LOKI backdoor detection).

tags | tool, intrusion detection
systems | unix
MD5 | 7c82926086a0c749ec83bf5f3e33dfb6
e2.tgz
Posted Aug 17, 1999
Authored by stealth

E2-Zip 1.0 is an excellent whitepaper about EXT2-weaknesses in the Linux 2.0.x kernels. "File-hiding" exploit code included.

tags | exploit, kernel
systems | linux
MD5 | 2139f221472ba4be0b38ef0284825a4d
my_login.c
Posted Aug 17, 1999
Authored by stealth

A "patched" login.c that gives user privileged access and logs other user's passwords.

tags | exploit
MD5 | 122c000a51b7b3a7dfd382b839ccf6b8
dip2.c
Posted Aug 17, 1999
Authored by stealth

dip-3.3.7o buffer overflow exploit code for local root compromise.

tags | exploit, overflow, local, root
MD5 | 3c4ae69c3fe7a00166b8ed91ff00f891
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    3 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close