exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from The Shadow Penguin Security

First Active1999-08-17
Last Active1999-08-17
ex_sdtcm_convert86.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Intel (x86) version of the Solaris sdtcm_convert buffer overflow exploit that leads to root compromise. Vendor patch available.

tags | exploit, overflow, x86, root
systems | solaris
SHA-256 | 3e7269f5c0d92230ce57b19725d9fd4b4d59d52962726ff328feed787e5b6f9e
ex_admintool-2.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Improved exploit for the Solaris 2.6 and 7 admintool buffer overflow that results in local root compromise. This version now works on Solaris 2.6 and 7 (Sparc). No vendor fix available.

tags | exploit, overflow, local, root
systems | solaris
SHA-256 | 8d303f6aa9b85116be01167ef7bfda7e644ba663dbb1af085c009878c26ce06c
ex_admintool.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Another admintool local root exploit for Solaris Sparc machines.

tags | exploit, local, root
systems | solaris
SHA-256 | 5f7899bb5deca8e860c107ee478601ece0f3eec639c83fb48b01b6ca4ea84fea
ex_dtprintinfo86.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Updated version of the dtprintinfo exploit for a stack buffer overflow present in x86 versions of Solaris 2.6 and 2.7. Local root compromise.

tags | exploit, overflow, x86, local, root
systems | solaris
SHA-256 | 0a126629e58953e738df87fb52fae2479e7385e7b8e4df08713e9830cd64b0a0
ex_dtprintinfosp.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Sparc port of the exploit code for the dtprintinfo stack buffer overflow present in Solaris 2.6 and 2.7 for Sparc. Local root compromise.

tags | exploit, overflow, local, root
systems | solaris
SHA-256 | 91942b965c81fd2dd50e8f406afc67f263dd8933de4e7b4590ecf0d88dfcf134
ex_lobc.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Exploit code for Solaris 2.6, 2.7 (sparc) libc/LC_MESSAGES buffer overflow that results in root compromise.

tags | exploit, overflow, root
systems | solaris
SHA-256 | 7834c650c1aee86bae61ec528b9b64d739e0cfb7d4b34c7217ceb9cb11a6222f
ex_lpset.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Updated version of the local root compromise exploit code for buffer overflow condition in lpset, for Solaris 2.6 and 2.7 x86 machines.

tags | exploit, overflow, x86, local, root
systems | solaris
SHA-256 | dcc9337cd406ecc8f22101df61bf9dccb5e8d48f756821114ef19e82651f2467
ex_lpset86.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Local root exploit code for buffer overflow in lpset, for Solaris x86 machines.

tags | exploit, overflow, x86, local, root
systems | solaris
SHA-256 | 093022951f61d3e66e4ff27f648ef0ce493f6eae6de8b1efa1e192e61c212869
ex_sdtcm_convert.c
Posted Aug 17, 1999
Authored by The Shadow Penguin Security

Local root exploit for buffer overflow condition in sdtcm_convert, for Solaris Sparc machines.

tags | exploit, overflow, local, root
systems | solaris
SHA-256 | fe609c3510ae259d42916b6e7e9db383db56b70e49de580105be5dd11bb6ae46
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close