exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Rembrandt

Email addressrembrandt at helith.org
First Active2007-04-21
Last Active2010-03-08
Known Host Cracker 0.2
Posted Mar 8, 2010
Authored by Rembrandt, Benkei

Known Host Cracker (khc) is a small tool designed to recover hashed known_host files back to their plain-text equivalents.

tags | tool
systems | unix
SHA-256 | a72983ee744d25dfc04d40a965a434d2113971925229e2050b24ca9d099830b0
Packet Filter Null Pointer Dereference
Posted May 1, 2009
Authored by Rembrandt

PF in OpenBSD, NetBSD, and various other Unix variants suffer from a null pointer dereference vulnerability.

tags | exploit
systems | netbsd, unix, openbsd
SHA-256 | ea97857d82a2cb2bbd3b45b74c0233c3578d157ebfaccdebe90b3f664c1bca03
OpenBSD 4.5 Denial Of Service
Posted Apr 14, 2009
Authored by Rembrandt

OpenBSD version 4.5 and below suffers from a remote denial of service vulnerability in relation to handling IP datagrams.

tags | exploit, remote, denial of service
systems | openbsd
SHA-256 | b86daf70a93aba34e9521f1f85a6a18282429fbe86a0914bf39c75eb3c2379f7
Netgear SSL312 Router Denial Of Service
Posted Feb 9, 2009
Authored by Rembrandt

Netgear embedded Linux for the SSL312 router suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
systems | linux
SHA-256 | c3e60be356b391967fdc9548e0abe4b3a004387eaaa4a3ae004260d54ca97171
Debian GNU/Linux XTERM DECRQSS Weakness
Posted Jan 7, 2009
Authored by Rembrandt

Debian GNU/Linux suffers from a XTERM DECRQSS weakness that allows for remote code execution as the user id viewing the content.

tags | exploit, remote, code execution
systems | linux, debian
SHA-256 | 2cf126cfa15a92ef06cfb3ec5e1789cbdc1db4514c80b724ea3ff5178539d03d
screen_4_0_3_password_bypass_openbsd.txt
Posted Jan 6, 2009
Authored by Rembrandt

screen versions 4.0.3 and below are vulnerable to an authentication bypass vulnerability that allows local attackers to gain system access in the case where screen was locked with a password. Tested on OpenBSD.

tags | exploit, local, bypass
systems | openbsd
SHA-256 | 5a6a888bcf05d77216b3849e8465eb8daa06ba3c92c524e8aee2d252bc558b41
screen-unlock.txt
Posted Jun 7, 2007
Authored by Rembrandt

Screen versions 4.0.3 and below suffer from an authentication bypass vulnerability when it is locked.

tags | exploit, bypass
SHA-256 | b967318756ba3a99cd10614a3f1df67c080af7881ed47503fbff5decaf6edf5a
openssh-disclose.txt
Posted Apr 23, 2007
Authored by Rembrandt

System account enumeration is possible when OpenSSH versions 4.6 and below have ChallengeResponseAuthentication enabled (S/KEY).

tags | advisory, info disclosure
SHA-256 | 1ff367e663ad5227576fda522c34ea8d41163498f44a0745cfb6727e9de28a90
OpenSSH s/key Weakness
Posted Apr 21, 2007
Authored by Rembrandt

OpenSSH, when configured to use S/KEY authentication, is prone to a remoteinformation disclosure weakness.

tags | exploit, info disclosure
advisories | CVE-2007-2243
SHA-256 | 827bc6c037cf63160a94b7ff9a14a24cb084daaa8c20cf1bd442f18e90af8314
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close