what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Mnemonix

Email addressdlitchfield at atstake.com
First Active1999-08-17
Last Active2000-10-05
A100400-1
Posted Oct 5, 2000
Authored by Mnemonix | Site atstake.com

Atstake Security Advisory - Microsoft's Internet Information Server 5.0 is WebDAV (RFC 2518) enabled. As part of the extra functionality provided by the WebDAV components. Microsoft has introduced the SEARCH request method to enable searching for files based upon certain criteria. This functionality can be exploited to gain what are equivalent to directory listings. These directory listings can be used by an attacker to locate files in the web directories that are not normally exposed through links on the web site. .inc files and other components of ASP applications that potentially contain sensitive information can be viewed this way.

tags | web, asp
SHA-256 | f2562bfaf09eac881c34bf6c3fc7b51eb464aca2b3cb81446d72d5bf1fc82e7c
oracle.web.listener.txt
Posted Dec 1, 1999
Authored by Mnemonix | Site infowar.co.uk

There is a vulnerability in Oracle Web Listener where a resource can be accessed when is shouldn't be able to be accessed.

tags | exploit, web
SHA-256 | edbaf44df750aefe719e9ff3f21674bad0f77af1f4d13f12053ddc777bd9e89b
formhandler.cgi.txt
Posted Nov 12, 1999
Authored by Mnemonix

FormHandler.cgi uses hard coded physical path names for templates so it is possible to read any file on the system.

tags | exploit, cgi
SHA-256 | 982f352a5e509b2e9e1fc85b0d6714be542e0e546c96f5882dc578ee003c3f13
ipccrack.exe
Posted Aug 17, 1999
Authored by Mnemonix

IPC$Crack Ver 2.0 - IPC$Crack is a command line based program that uses a dictionary based attack to attempt to learn the password of an account on an NT box. For Win95/98/NT.

tags | cracker
systems | windows
SHA-256 | b141ab9059995c591e00554e024aaf21aa112f1df6acde66e65fb8f3395a5324
nt4.trojaned.profiles.txt
Posted Aug 17, 1999
Authored by Mnemonix

Bad permissions on Windows NT ProfileList registry subkeys allow any malicious NT user to cause other users of the system to load a "trojaned" profile that could lead to a system compromise. Exploit description and vendor solution included.

tags | exploit, trojan, registry
systems | windows
SHA-256 | 54057eb398a0eeecb0fcb718eabe86ff4593d8772f67adaac7ec2fed79e5fad7
nt4.index.server.2.0.txt
Posted Aug 17, 1999
Authored by Mnemonix

Microsoft's Index Server 2.0 allows anybody to discover the physical path to directories being indexed, or if a directory found in a network share is being indexed, they can learn the name of the machine on which the share resides and the name of the user account used to access that share on behalf of Index and Internet Information Server 4.

tags | exploit
SHA-256 | 1d0ab1349677a5f4764c564c47751f2d857b11dce433226ba5d17336d4e2c794
Page 1 of 1
Back1Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close