what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from Loophole

Email addresspigspigs at yahoo.com
First Active1999-12-14
Last Active2001-03-06
hhp-gdc_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | 59ac3f8c25947407d2c2124b1b923963380381d66406ef270bdd57b3c00baae5
hhp-ospf_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | b3df13e1c7b793947794b12771072086104e86b8f0f39f8f17d3b3f017cad2b0
hhp-webinfo.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.

tags | remote, web
SHA-256 | 9daeb72af38ace3ab3f9e5d03f959dc534f506d19b3bca2a347b14881c7f11c5
hhp-knock_shellcode.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Shellcode which plays audio (knock knock) vi /dev/dsp and setreuid(0,0) + execve shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | a45331428e22c886119ae7325c4e640708d51d8be28eb45a5a5c17f3fa5b13a9
hhp-GnomeScott_smash.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

GnomeScott local buffer overflow which provides a gid=40 (game) shell on SuSE 6.4 and 7.0.

tags | exploit, overflow, shell, local
systems | linux, suse
SHA-256 | b91af559b80952154115640a2ad71c7a3af251836cff99bde6dad6259ee95e28
hhp-gnomehack_smash.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Gnomehack local buffer overflow exploit which provides a gid=60 (games) shell on Debian 2.2.

tags | exploit, overflow, shell, local
systems | linux, debian
SHA-256 | 5ccc4924acae3a7b73ecd24a19febb73d31ccc8e7ed7d704614e4dcbd8d4550a
hhp-kwintv_smash.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Kwintv local buffer overflow exploit which provides a gid=33 (video) shell on SuSE 7.0.

tags | exploit, overflow, shell, local
systems | linux, suse
SHA-256 | d44863b348783f75efca589a0a0b99b6a150e833cd2e1dd95d32999361050380
hhp-dtors.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Generic ELF .dtors exploit.

SHA-256 | 7e4fcc9e325b71ea4dd0f30de481f4eb9dcb0403da041f927b6e200a7a9d57d4
hhp-genchains.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Ipchains firewall frontend - Prompts enabled.

SHA-256 | 79f4d5c6dd2281fff7d8406580199d4e0cd4abdc137d8e7af428569d2d60ced3
hhp-stonx_smash.c
Posted Dec 28, 2000
Authored by Loophole, hhp | Site hhp-programming.net

STonX v0.6.5 and v0.6.7 local root exploit. Tested on Slackware 7.0.

tags | exploit, local, root
systems | linux, slackware
SHA-256 | c751c9ecd87655ab1f2703c193c5080ea84909a0b48d28666ce7f32edbf5b25e
hhp-kermit_smash.c
Posted Sep 19, 2000
Authored by Loophole, hhp | Site hhp-programming.net

C-Kermit local exploit. Versions 7.0.197 and below are vulnerable. Tested on Slackware 7, where it is not suid. It is suid on Olivetti X/OS R2.3, 3.x.

tags | exploit, local
systems | linux, slackware
SHA-256 | b1c58ec5e7f44694f976de55f2766d8a2088c17241a91eff5815c66be7258e40
hhp-PMS.tar.gz
Posted Jun 26, 2000
Authored by Loophole, hhp

pms.pl is watches for certain running processes and alerts you via /dev/speech when they start.

tags | system logging
systems | unix
SHA-256 | e43969bd8b52cef54eed32fc170fda5e248565c948046a25250e12d54c508f9b
hhp-SSH_TROSNIFF.tgz
Posted Jun 21, 2000
Authored by Loophole, hhp

hhp-trosniff is a complete package of patches to modify ssh, ssh2, sshd, ssh2d, and opensshd to extract and log the Incoming/Target HostName/UserName/Password. Intended to log brute force attacks and deleted users who try to gain access.

tags | system logging
systems | unix
SHA-256 | dcd2446c221b1f508f4cb4f10180ef49e02bc7c6f6175b03fbda534c2fe97489
hhp-whois_adv0013.txt
Posted Dec 14, 1999
Authored by Loophole, hhp | Site hhp.perlx.com

Whois.CGI - ADVISORY (hhp) Hole in several known/unknown vulnerabilities in Whois CGI packages. Affected are Whois Internic Lookup version 1.0, CC Whois Version 1.0, and Matt's Whois Version 1. These versions allow execution of commands due to lack of shell escape character parsing.

tags | exploit, shell, cgi, vulnerability
SHA-256 | 2360cca9573c4bd4934cb2e44e71bf956a22efa26aedae17ea0768db32124048
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close