what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Solar Eclipse

Email addresssolareclipse at phreedom.org
First Active1999-11-23
Last Active2010-04-15
Windows ANI LoadAniIcon() Chunk Size Stack Overflow (HTTP)
Posted Apr 15, 2010
Authored by H D Moore, Solar Eclipse, skape | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function in USER32.dll. The flaw can be triggered through Internet Explorer 6 and 7 by using the CURSOR style sheet directive to load a malicious .ANI file. The module can also exploit Mozilla Firefox by using a UNC path in a moz-icon URL and serving the .ANI file over WebDAV. The vulnerable code in USER32.dll will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.

tags | exploit, overflow
advisories | CVE-2007-0038
SHA-256 | 77a69a99c5c235c2339e0f087749f6b147c5953684914f6479b3edef34269f9a
Microsoft ASN.1 Library Bitstring Heap Overflow
Posted Nov 26, 2009
Authored by Solar Eclipse | Site metasploit.com

This is an exploit for a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. You are only allowed one attempt with this vulnerability. If the payload fails to execute, the LSASS system service will crash and the target system will automatically reboot itself in 60 seconds. If the payload succeeeds, the system will no longer be able to process authentication requests, denying all attempts to login through SMB or at the console. A reboot is required to restore proper functioning of an exploited system. This exploit has been successfully tested with the win32/*/reverse_tcp payloads, however a few problems were encounted when using the equivalent bind payloads. Your mileage may vary.

tags | exploit, vulnerability
systems | windows
advisories | CVE-2003-0818
SHA-256 | 8d9c928e6cd1a6002436a9b5bc1e9d94a868525515b51e06f0839ad3d7e7a68e
openldap-kbind-p00f.c
Posted Dec 15, 2006
Authored by Solar Eclipse | Site phreedom.org

Exploit for a buffer overflow in the Kerberos KBIND authentication code in the OpenLDAP slapd server for versions 2.4.3 and below. Note that the vulnerable code only exists in versions compiled with the --enabled-kbind option.

tags | exploit, overflow
SHA-256 | caeceb13a21843c70ef44e4acb32c112873063011f8be8a62366988ea194cee7
openLDAPslapd.txt
Posted Dec 15, 2006
Authored by Solar Eclipse | Site phreedom.org

There is a remotely exploitable buffer overflow in the Kerberos KBIND authentication code in the OpenLDAP slapd server for versions 2.4.3 and below. Note that the vulnerable code only exists in versions compiled with the --enabled-kbind option.

tags | advisory, overflow
SHA-256 | 54270c3ab1c76258b3f9b734939eb5302564892ad181533e51b47cc846db885d
openssl-too-open.tar.gz
Posted Sep 17, 2002
Authored by Solar Eclipse | Site phreedom.org

OpenSSL v0.9.6d and below remote exploit for Apache/mod_ssl servers which takes advantage of the KEY_ARG overflow. Tested against most major Linux distributions. Gives a remote nobody shell on Apache and remote root on other servers. Includes an OpenSSL vulnerability scanner which is more reliable than the RUS-CERT scanner and a detailed vulnerability analysis.

tags | exploit, remote, overflow, shell, root
systems | linux
SHA-256 | c88611b47510d29c7ffc79305da0f9f807c86eca08d9f8b917f5dc22497b79bf
onesixtyone-0.3.tar.gz
Posted Mar 20, 2002
Authored by Solar Eclipse | Site phreedom.org

onesixtyone 0.3 is an efficient SNMP scanner which utilizes a sweep technique to achieve good performance. It finds SNMP devices on your network and brute-forces the community strings using a dictionary. It is possible to scan a class B network (65536 ip addresses) in under 13 minutes with a high degree of accuracy. Tested on Linux, FreeBSD, OpenBSD and Solaris.

Changes: This release includes portability enhancements.
tags | tool, scanner
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 0baedfe247ea6e07cb88efdc67ca4e7a47bf6457a6de0a5cb0cc8f3851085203
onesixtyone-0.2.tar.gz
Posted Mar 6, 2002
Authored by Solar Eclipse | Site phreedom.org

Onesixtyone 0.2 is an efficient SNMP scanner which utilizes a sweep technique to achieve good performance. It finds SNMP devices on your network and brute-forces the community strings using a dictionary. It is possible to scan a class B network (65536 ip addresses) in under 13 seconds with a high degree of accuracy.

tags | tool, scanner
systems | unix
SHA-256 | c38ddf5c0728cab9405505ecd67ca0397428815f22a15c5856c6770b5df41a44
locale_sol.txt
Posted Nov 22, 2001
Authored by Solar Eclipse | Site phreedom.org

This paper describes in detail the exploitation of the libc locale format string vulnerability on Solaris/SPARC. The full source code for the exploit is presented and some details of the implementation are discussed.

tags | exploit
systems | solaris
SHA-256 | 7b17fe99c5995c3700f946e8abe827d958a46295cd8e9068e1a590b08b7ef993
vxd.txt
Posted Jul 13, 2000
Authored by Solar Eclipse

This article explains the basics of Windows 9x kernel module development and contains the full source of a VXD based loadable kernel module (LKM) named Burning Chrome which captures TCP and dialup traffic and emails captured passwords. It is virtually undetectable with standard windows tools.

tags | kernel, tcp
systems | windows
SHA-256 | 87fa9aee4577a7193e8075c35f0eb9896c3eada29f7e2ade9ad39bfb0815ca1a
wordpad.txt
Posted Nov 23, 1999
Authored by Solar Eclipse

Riched20.dll, which Microsost wordpad uses, is vulnerable to a buffer overflow attack. This paper gives lots of detailed information on of exploiting this vulnerability.

tags | exploit, overflow
SHA-256 | 3f1b59360021dd122d37fd44d66487de0c4de9144e6bb58b16b27327eed42ef1
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close