exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from WC

Email addresswildcoyote at coders-pt.org
First Active2000-02-25
Last Active2000-09-13
rovikingxploit.c
Posted Sep 13, 2000
Authored by WC

Robotex Viking Server 1.0.6 Build 355 and prior for Windows 95 and NT remote buffer overflow exploit. Binds a shell to a port.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | e22c42e753f4fa08366620f23765653b64d03ab67ef2ecf8a07e490cb488a968
mobiusdocdix.c
Posted Sep 13, 2000
Authored by WC

Mobius DocumentDirect for the Internet 1.2 remote exploit. Binds a shell to a port.

tags | exploit, remote, shell
SHA-256 | ce3a7e218bb9fb62db69535c606419166b381ba3fb2b77281d56bfcfa40b2ec3
msw2ktelnetdos.sh
Posted Sep 7, 2000
Authored by WC

Windows 2000 telnet server denial of service exploit.

tags | exploit, denial of service
systems | windows
SHA-256 | 4b4ac82588b827afa52230a5621bf5b7eff2d4b62e97dd799a095d1aa6e8cf1f
awcrash.c
Posted Sep 7, 2000
Authored by WC

awcrash.c exploits a buffer overflow vulnerability in Windows 95 and 98 which will result in a crash if a filename with an extension longer that 232 characters is accessed. Although arbitrary code could be executed via this manner, it would have to be composed of valid filename character values only.

tags | exploit, overflow, arbitrary
systems | windows
SHA-256 | 7ad7a060484ff8053e615253a0723a73a32a083f94fe5194af600dcb8126a5e4
wcGoph.c
Posted Aug 14, 2000
Authored by WC

Gopher+ v2.3.1p0 remote exploit - Spawns a remote shell on tcp port 36864 under the UID that the gopher+ daemon runs as. Tested against Linux Slackware 3.6 / 7.0.

tags | exploit, remote, shell, tcp
systems | linux, slackware
SHA-256 | 71aa58978ab9c730cefaa09803a9c98febeb91b69d9d601ac9a232b790ac1e41
wuXploit.tgz
Posted Jul 1, 2000
Authored by WC

Wu-Ftpd 2.4.2, 2.5, and 2.6 are commonly misconfigured on linux to allow users which only have a valid FTP account to execute code. This code takes advantage of this configuration, mentioned in SUID Advisory #1 to execute a backdoor on the remote host.

tags | exploit, remote
systems | linux
SHA-256 | 9219f3dc8c4357646bf46266ad5c55bda0e603191ef80f27186b4ccf5fb83945
SuSeLocaltmpXploit.c
Posted Jul 1, 2000
Authored by WC

SuSe 6.1 through 6.4 local exploit - when root switches users, /tmp/ will be the $HOME. This exploit will create a suid (user) shell when root su's to a user account.

tags | exploit, shell, local, root
systems | linux, suse
SHA-256 | 0c640e5bd6cad6ab1a9f902ec11367abac1597d2768eedf475e4293e23c3c435
Xnapster.c
Posted Jul 1, 2000
Authored by WC

Gnapster 1.3.8 and Knapster 0.9 remote view file exploit.

tags | exploit, remote
SHA-256 | 53c82a8e2d27ddb652a607c8842ffdc06767db6dc99711ae7c83b0e6575c08d9
proftpX.c
Posted Jul 1, 2000
Authored by WC

ProFTPD 1.2pre4 remote buffer overflow exploit. Requires a writable directory.

tags | exploit, remote, overflow
SHA-256 | ddaa523bce8660f1ea7139487103115776722b6432a3e876c8f85d29b5c96cc5
JRUNremoteXploit.tgz
Posted Jul 1, 2000
Authored by WC

JRun 2.3 remote buffer overflow exploit. Runs a shell on the port where the JRun webserver daemon is running.

tags | exploit, remote, overflow, shell
SHA-256 | 0009f8a8198fbfbcd6431fe2f632926a00f52ef872ba53530e82d7fec95be05d
iisdos.c
Posted Jun 26, 2000
Authored by WC

iisdos.c is a dos attack against Microsoft Windows 2000.0 running IIS.

tags | exploit
systems | windows
SHA-256 | 3a5391689ea601a5d266aaa724384ad438a4b0e2bd5af92c61ad494be825bb70
apcd.c
Posted Jun 19, 2000
Authored by WC

Debian 2.1 local root exploit - A vulnerability exists in the apcd package shipped with Debian 2.1.

tags | exploit, local, root
systems | linux, debian
SHA-256 | f7ca16d4ea9299fd7aef4c4a72b95848377702b1feeccf9d2d657e4193b25dbe
wpack1.2b.zip
Posted Feb 29, 2000
Authored by WC

The WC Remote Administration Tool (v1.2b) is a Windows remote control trojan coded in Delphi. The client is in C and runs on unix. Includes a tool (LookItUp.c) to test a host for infection. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
systems | windows, unix
SHA-256 | ec93afe0a1310cc59aa7b6f86bf45f137b1188460ae088fc8eb3f751e59a4264
HTTP-XpsScanner.tgz
Posted Feb 25, 2000
Authored by WC

HTTP-XpsScanner scans a remote webserver for 77 vulnerable cgi scripts.

tags | remote, web, cgi
systems | unix
SHA-256 | 9f64d018277b2464ac86046ec1d3fc1aae140c378368b93e82d9c71a193f3bec
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close