exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 72 of 72 RSS Feed

Files from Marco Ivaldi

Email addressraptor at 0xdeadbeef.info
First Active2000-02-23
Last Active2024-03-05
raptor_udf.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit that makes use of the dynamic library for do_system() in MySQL UDF. Tested on MySQL 4.0.17.

tags | exploit, local, root
SHA-256 | 95a7207a7051562030ac705492537b56b8b7240a2c9e35e9973ec9e34e4a0c48
raptor_rlogin.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Remote root exploit for rlogin on Solaris/SPARC 2.5.1/2.6/7/8. This remote root exploit uses the (old) System V based /bin/login vulnerability via the rlogin attack vector, returning into the .bss section to effectively bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system).

tags | exploit, remote, root
systems | solaris
advisories | CVE-2001-0797
SHA-256 | bfeb19101920045f9d6f6904868ad67701158aa7b9bc94f200fad68320b7c937
raptor_passwd.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a vulnerability in the passwd circ() function under Solaris/SPARC 8/9. This exploit uses the ret-into-ld.so technique, to effectively bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system).

tags | exploit, local, root
systems | solaris
advisories | CVE-2004-0360
SHA-256 | a6e61ccf2c4234b32ebb45aaf4f04d6bf8eaca49b1b7f4a8c10f9a63208bbd20
raptor_libdthelp2.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a buffer overflow in CDE libDtHelp library that allows local users to execute arbitrary code via a modified DTHELPUSERSEARCHPATH environment variable and the Help feature. Works against Solaris/SPARC 7/8/9. This is the ret-into-ld.so version of raptor_libdthelp.c, able to bypass the non-executable stack protection (noexec_user_stack=1 in /etc/system).

tags | exploit, overflow, arbitrary, local, root
systems | solaris
advisories | CVE-2003-0834
SHA-256 | b8436092faaf18ae6c0392c009430729a21181ff6e47eb8696bfd081a924f23b
raptor_libdthelp.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a buffer overflow in CDE libDtHelp library that allows local users to execute arbitrary code via a modified DTHELPUSERSEARCHPATH environment variable and the Help feature. Works against Solaris/SPARC 7/8/9.

tags | exploit, overflow, arbitrary, local, root
systems | solaris
advisories | CVE-2003-0834
SHA-256 | 5e7614c63543acb78f04d9c4e7b85a01cf23e73fb1477712065be31ad5ee010b
raptor_ldpreload.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local root exploit for a stack-based buffer overflow in the runtime linker, ld.so.1, on Solaris 2.6 through 9 that allows local users to gain root privileges via a long LD_PRELOAD environment variable.

tags | exploit, overflow, local, root
systems | solaris
advisories | CVE-2003-0609
SHA-256 | 6d7bdc11a3396a323aa02a43e2fdb992917edce2a4b72006644e2f579e17c406
raptor_chown.c
Posted Dec 31, 2004
Authored by Marco Ivaldi | Site 0xdeadbeef.info

Local exploit for a flaw in Linux kernel that allows for group ownership change and possible system compromise. Tested against Linux kernel versions 2.4.x through 2.4.27-rc3 and 2.6.x through 2.6.7-rc3.

tags | exploit, kernel, local
systems | linux
advisories | CVE-2004-0497
SHA-256 | 394ace8ae631f8551b925e291c9b4df9a9dbf06bdb3748733e63e42f78b2595d
ward2.c
Posted Dec 23, 2003
Authored by Marco Ivaldi | Site 0xdeadbeef.info

WARD v2.0 is a classic war dialer - it scans a list of phone numbers, finding the ones where a modem is answering the call. WARD can generate phone number lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. WARD is one of the fastest PBX scanners around (and possibly the best for UNIX environments). Tested on OpenBSD, Linux, and Windows under Cygwin.

tags | tool, wardialer
systems | linux, windows, unix, openbsd
SHA-256 | 9e8fef3e2e9568bdfa6a72fb1dbb6de5773363101d30bbac16e3271d4428b2f9
brutus.pl
Posted Oct 30, 2003
Authored by Marco Ivaldi

Brutus.pl v1.3 tries to break in remotely using password bruteforcing for TELNET, FTP and POP3 protocols. Login list generation through SMTP vrfy/expn and CISCO login information leaks is also supported.

tags | cracker, protocol
systems | cisco
SHA-256 | 22a1eae37ef2eaae85ec019318e53838a23b29963e6428dc3f6fe36d3c8ca01c
pfilter.pl
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

PFilter filters OpenBSD PF log files parsed by tcpdump and prints colored messages. Both /var/log/pflog and pflog0 are supported for real-time logging. Tested on OpenBSD 3.2.

tags | tool, sniffer
systems | openbsd
SHA-256 | 06aabdf94e4b27e355ac9c84239893655812953cf957332b8fdef3f30e001dd9
psibrute.com.txt
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users.

systems | vax
SHA-256 | b300bdc9bf7a8a50ee833fcd7c6502f1b542165feca28c88b135ae16d0afbccb
snortctl.tar.gz
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site aenigma.mediaservice.net

A suite of scripts that were originally part of the AEnigma DIDS Project. The script snortctl is for management of the Snort NIDS. The snortfilter is a log parser and colorized.

tags | tool, sniffer
SHA-256 | a20e34b031a3b811e776cf26ef2b23b8da7a07a37c0d686dcea96aab426d35a4
havoc-0.1d.tar.gz
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

HAVOC is a random ARP traffic generator which will temporarily hose your ethernet segment. Bug fix of previous release (0.1c)

tags | denial of service
SHA-256 | 74e17c81361042e28aa21c339279aa472c86be6884323f0e8f0583ed01d48727
ward19.c
Posted Nov 1, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

WARD v1.9 is a classic war dialer - it scans a list of phone numbers, finding the ones where a modem is answering the call. WARD can generate phone numbers lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. WARD is one of the fastest PBX scanners around (and possibly the best for UNIX environment). Tested on OpenBSD, Linux, and Windows under Cygwin.

tags | tool, wardialer
systems | linux, windows, unix, openbsd
SHA-256 | 7748d8d450a96e76ab2792fc8b5e056897627e4a46cdbe2f4c1c0513fe842223
brutus05.pl
Posted Oct 4, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

BRUTUS v0.5 is a remote TCP/IP service brute forcer. It tries to break in using TELNET, FTP and POP3 protocols. Login list generation through SMTP vrfy brute-forcing is also supported.

tags | remote, cracker, tcp, protocol
SHA-256 | ae062f6d34c14746efa6629ff0f71bb26b6530315949714ee106b88ce0a3b1d5
ward18.c
Posted Oct 4, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

WARD v1.8 is a classic war dialer - it scans a list of phone numbers, finding the ones where a modem is answering the call. WARD can generate phone numbers lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. WARD is one of the fastest PBX scanners around (and possibly the best for UNIX environment). Tested on OpenBSD and Linux.

tags | tool, wardialer
systems | linux, unix, openbsd
SHA-256 | de328d9308ffc5500adcca4fe49a4be425aed38f7e62550cd8043829c52709a5
ward17.c
Posted Nov 5, 2001
Authored by Marco Ivaldi | Site 0xdeadbeef.eu.org

WARD v1.7 is a classic war dialer: it scans a list of phone numbers, finding the ones where a modem is answering the call. WARD can generate phone numbers lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. WARD is one of the fastest PBX scanners around (and possibly the best for UNIX environment). Tested on OpenBSD and Linux.

tags | tool, wardialer
systems | linux, unix, openbsd
SHA-256 | bf6d61d5f2eeb2b286d8900abe800e604d3856c75e62eba1e1ade8c1622b0c92
ward.c
Posted Mar 16, 2001
Authored by Marco Ivaldi | Site 0xdeadbeef.eu.org

WARD v1.0 is a classic war dialer: it scans a list of phone numbers, finding the ones where a modem is answering the call. Wargames still r0cks. WARD can generate phone numbers lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. Tested on Linux.

tags | tool, wardialer
systems | linux
SHA-256 | 3d6ac9f41626b7fe14cf0698b5eba65d9ddbf380d57d73126c87d9614543d3c5
vudu
Posted Feb 27, 2001
Authored by Marco Ivaldi | Site 0xdeadbeef.eu.org

Vudu is a simple X.25 NUA scanner for Unix systems. It is written in bash for portability. Tested on Solaris.

tags | tool, scanner, bash
systems | unix, solaris
SHA-256 | 2dcad5359323ccb260a10fc12d3502c644bce9be6574b8ac75f7bed8d285e5d2
autoscan.pl
Posted Feb 16, 2001
Authored by Marco Ivaldi | Site raptor.antifork.org

Autoscan scans for valid NUAs using the autonet x25pad gateway, logging valid NUAs that refuse connection (requiring a valid NUI to connect), freely available NUAs (accepting reverse charging) and Calls Cleared 0-67 (DTE, subaddress specification needed).

tags | tool, scanner
systems | unix
SHA-256 | 9b63dbeddbacc6e694e2152f78223667e7721b72279b8ded41e6ea2e7262d986
bounce.c
Posted Feb 2, 2001
Authored by Marco Ivaldi | Site antifork.org

Bounce.c is a simple program to connect TCP ports. Use it just as a telnet-like client and send a SIGINT to make it sit on the background and open the specified port on localhost. Then you can connect on this local port and resume the interrupted session, data-piped.

tags | local, tcp
systems | unix
SHA-256 | 8c61637268c0eaba97793ac36c9f2ae4cd64864567fcb6940196fbcefadb28f6
havoc-0.1c.tgz
Posted Feb 23, 2000
Authored by Marco Ivaldi

HAVOC is a random ARP traffic generator which will temporarily hose your ethernet segment.

tags | denial of service
SHA-256 | e5c6da7e285549a3ca48d9c4a8ebfc7703a5fe454264966591225bdb240edc17
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close