exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Mnemonix

Email addressdlitchfield at atstake.com
First Active1999-08-17
Last Active2000-10-05
A100400-1
Posted Oct 5, 2000
Authored by Mnemonix | Site atstake.com

Atstake Security Advisory - Microsoft's Internet Information Server 5.0 is WebDAV (RFC 2518) enabled. As part of the extra functionality provided by the WebDAV components. Microsoft has introduced the SEARCH request method to enable searching for files based upon certain criteria. This functionality can be exploited to gain what are equivalent to directory listings. These directory listings can be used by an attacker to locate files in the web directories that are not normally exposed through links on the web site. .inc files and other components of ASP applications that potentially contain sensitive information can be viewed this way.

tags | web, asp
SHA-256 | f2562bfaf09eac881c34bf6c3fc7b51eb464aca2b3cb81446d72d5bf1fc82e7c
oracle.web.listener.txt
Posted Dec 1, 1999
Authored by Mnemonix | Site infowar.co.uk

There is a vulnerability in Oracle Web Listener where a resource can be accessed when is shouldn't be able to be accessed.

tags | exploit, web
SHA-256 | edbaf44df750aefe719e9ff3f21674bad0f77af1f4d13f12053ddc777bd9e89b
formhandler.cgi.txt
Posted Nov 12, 1999
Authored by Mnemonix

FormHandler.cgi uses hard coded physical path names for templates so it is possible to read any file on the system.

tags | exploit, cgi
SHA-256 | 982f352a5e509b2e9e1fc85b0d6714be542e0e546c96f5882dc578ee003c3f13
ipccrack.exe
Posted Aug 17, 1999
Authored by Mnemonix

IPC$Crack Ver 2.0 - IPC$Crack is a command line based program that uses a dictionary based attack to attempt to learn the password of an account on an NT box. For Win95/98/NT.

tags | cracker
systems | windows
SHA-256 | b141ab9059995c591e00554e024aaf21aa112f1df6acde66e65fb8f3395a5324
nt4.trojaned.profiles.txt
Posted Aug 17, 1999
Authored by Mnemonix

Bad permissions on Windows NT ProfileList registry subkeys allow any malicious NT user to cause other users of the system to load a "trojaned" profile that could lead to a system compromise. Exploit description and vendor solution included.

tags | exploit, trojan, registry
systems | windows
SHA-256 | 54057eb398a0eeecb0fcb718eabe86ff4593d8772f67adaac7ec2fed79e5fad7
nt4.index.server.2.0.txt
Posted Aug 17, 1999
Authored by Mnemonix

Microsoft's Index Server 2.0 allows anybody to discover the physical path to directories being indexed, or if a directory found in a network share is being indexed, they can learn the name of the machine on which the share resides and the name of the user account used to access that share on behalf of Index and Internet Information Server 4.

tags | exploit
SHA-256 | 1d0ab1349677a5f4764c564c47751f2d857b11dce433226ba5d17336d4e2c794
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close