what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Zorgon

Email addresszorgon at linuxstart.com
First Active2000-08-17
Last Active2001-01-09
exhpcu.c
Posted Jan 9, 2001
Authored by Zorgon

HP-UX v11.00 /bin/cu local buffer overflow exploit - Exploits the -l option. Provides a uid=bin shell.

tags | exploit, overflow, shell, local
systems | hpux
SHA-256 | 4eb65814f18d048afcb2595ba4538c73bdf060588b077aeaa9201aff06040d45
xsold.c
Posted Dec 16, 2000
Authored by Zorgon | Site nightbird.free.fr

Linux Xsoldier local root buffer overflow exploit. Overflows the -display command line option.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | b399b42f07b8641525a5352aaf822e9698210c090495c285cd9fc11af3fdf062
cgiforum-1.0.txt
Posted Dec 3, 2000
Authored by Zorgon

CGIForum v1.0i (cgi-bin/cgiforum.pl) allows remote users to view any file on the system via a ../.. bug.

tags | exploit, remote, cgi
SHA-256 | 54a31d246b1ce0df322a76314cf66492c32c1c40d5388c5187fc9b897b0070fa
cryptdata.pl
Posted Nov 29, 2000
Authored by Zorgon

Cryptdata.pl encrypts/decrypts files with Crypt::Blowfish perl module. It is useful to encrypt home directories.

tags | perl, encryption
SHA-256 | b68cedfd65d4cc3b13b3fa396e71959cc57c62ff32879503ad41579cce297a58
hp-ux.cu.overflow.txt
Posted Nov 5, 2000
Authored by Zorgon

HP-UX vB.11.00 comes with /bin/cu SUID bin, which has a buffer overflow in the -l switch.

tags | exploit, overflow
systems | hpux
SHA-256 | 77af8460241fd99399a8eb2a90950ce6aa3a1b5653ac799c208865c42b2ef1d5
riven-1.0.1.tar.gz
Posted Oct 27, 2000
Authored by Zorgon

Riven is a CGI scanner which uses RFP anti-IDS tactics, flase browser / referer, and a perl/GTK interface.

tags | cgi, perl
systems | unix
SHA-256 | 019a8748eaa49d241b60bb6fe6e9a2db8eba78d1cebf024f19f604827be4eb21
anyportal-0.1.txt
Posted Sep 11, 2000
Authored by Zorgon | Site nightbird.free.fr

Anyportal v0.1 allows remote users to read any file on the webserver by submitting modified forms.

tags | exploit, remote
SHA-256 | e1ec85ae33fed5f71b59bb5010d7c3248c2ba5c473dd1c55908c4be4e6a1ee39
bird.pl
Posted Sep 6, 2000
Authored by Zorgon

bird.pl is a source code scanner which uses regular expressions to search for 12 common insecure C calls and 8 common insecure perl functions.

tags | perl
systems | unix
SHA-256 | ecfc2feab3db209ede8d7618dbec2a07c23e18d23b6e2044b31f33e689ccd646
clientagent662.txt
Posted Aug 31, 2000
Authored by Zorgon | Site nightbird.free.fr

Client Agent 6.62 for Unix Vulnerability, Tested on a Debian 2.2.14, Client Agent has a hole allowing to execute an arbitrary code by root without its knowing. In the meantime, some conditions are necessary to exploit this vulnerability. Client Agent is used with ARCserveIT, the safe software. It must be installed on all the workstations. A global configuration file agent.cfg keep every sub-agents installed on your system. This file is in /usr/CYEagent, and receive the information from the sub-agent when the script /opt/uagent/uagensetup is run.

tags | exploit, arbitrary, root
systems | linux, unix, debian
SHA-256 | 1daaedd6f40ccb604880096f68d1f14543064744d2f5c8d9d8a384929bef9ccd
crackncftp.c
Posted Aug 17, 2000
Authored by Zorgon | Site zorgon.freeshell.org

The ncftp client uses an easily decrypted scheme to save passwords to remote FTP sites in a bookmark file. Crackncftp.c provides the plaintext when from the encrypted string.

tags | exploit, remote
SHA-256 | 4ed56e4e5d88cc9b9c62d4ce74ab7b94bc9d98b285cadb58d0da304ceca15a9b
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close