exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files from netric

First Active2002-04-23
Last Active2003-07-24
msqlex.c
Posted Jul 24, 2003
Authored by The Itch, netric, lucipher | Site netric.org

Remote exploit for miniSQL version 1.3 and below that achieves privilege escalation root gid.

tags | exploit, remote, root
SHA-256 | e3637acdc0aea734e04f3ed1cd756e1015ef7c75c0c7bf4b03ee10155c796dc7
nagini.c
Posted Apr 30, 2003
Authored by netric, Sacrine | Site netric.org

A simple TCP packetlogger/sniffer for Linux which includes background logging.

tags | tcp
systems | linux
SHA-256 | 35c08a7777d1b751a168478dad9d3126b0d7fa46d8d372c1035af3c21843f383
Netric-RE-partII.pdf
Posted Apr 22, 2003
Authored by The Itch, netric, Gloomy | Site netric.org

Radical Environments part II - This paper continues where part one left off, detailing a technique in writing 0 bytes when exploiting a local buffer overflow using a non-executable stack with the heap being stored in memory at a virtual address containing a \x00 byte.

tags | overflow, local
SHA-256 | 004f5ce4295a0c7432dff945d7e66862613b1de871421317eb084f690a1eadb4
envpaper.pdf
Posted Apr 22, 2003
Authored by The Itch, netric, Gloomy | Site netric.org

Radical Environments part I - A paper that compiles various stack related tips and tricks which discusses how an exploit without nops works.

SHA-256 | edb58041e15067b25c301cea23aa6636cce03f73b92887f76abbcf3454343f12
fmtstring.txt
Posted Apr 22, 2003
Authored by The Itch, netric | Site netric.org

Detailed paper that describe format string vulnerabilities and how to exploit them.

tags | vulnerability
SHA-256 | 58ebad71f55604ab6a49305de83b658c361377f6b555c59d609be9859e0f83d1
execve2.c
Posted Apr 22, 2003
Authored by The Itch, netric | Site netric.org

Linux x86 shellcode (31 bytes) which does setuid(0); execve ("/bin/sh",0);

tags | x86, shellcode
systems | linux
SHA-256 | 5bf02bc71bb5d4648b9c13d8972996bb9aaf9e36385951be7c76068bf151afac
anti-ptrace.txt
Posted Apr 16, 2003
Authored by netric, Sacrine | Site netric.org

Linux LKM that disables ptrace abilities in the 2.4.x kernels.

tags | kernel
systems | linux
SHA-256 | 1d8cb9eedc847c0da5391b758eba2303658fc96887860ddadb104e0b904b66df
zkill.c
Posted Apr 2, 2003
Authored by netric, Ilja van Sprundel | Site netric.org

A small utility that allows you to kill zombie processes on x86 Linux.

tags | x86
systems | linux
SHA-256 | a2a77ba73f71c96c56aca603232fa0dd92eeb9a87f9c1116df3870f77bfabbd3
sparc-write.c
Posted Apr 2, 2003
Authored by eSDee, netric | Site netric.org

Solaris Sparc shellcode that writes netric was here.

tags | shellcode
systems | solaris
SHA-256 | e3af7d99040def573ba17626a6c290811b8d7652264094ec8340fdf45dac57c5
sparc-sh.c
Posted Apr 2, 2003
Authored by eSDee, netric | Site netric.org

Solaris Sparc shellcode that sets the effective uid to 0 and executes a shell.

tags | shell, shellcode
systems | solaris
SHA-256 | b4f74f95b8bd45fe94c359024720079f6ee3e0151ca7a8a1f62db7483e21af68
recluse.pl
Posted Apr 2, 2003
Authored by netric, PoWeR PoRK | Site netric.org

Recluse 0.1 - A web spidering utility written in Perl that takes a host as input along with a document path.

tags | web, perl
SHA-256 | bce2ab1997ba9c18e5fde1e6438685c5f141e02ff3e5b9d6b004bb8c6c3a71cb
printerfun.pl
Posted Apr 2, 2003
Authored by netric, Laurens | Site netric.org

Printer fun is a little utility that allows a remote user to change the "ready message" on printers that support PJL commands. Tested against the HP 4000/4100.

tags | remote
SHA-256 | 1597a3c0f6c607bd942fd6b507789c22fe0be4e8e9f9a0927f03e25bb26e9fe4
cgrep.c
Posted Apr 2, 2003
Authored by eSDee, netric | Site netric.org

Core grep is a utility that works like grep but was designed to be used against core files.

SHA-256 | d20e5c8dc13d0cce1e98db9f2a8559cb03f62d5dee59b44f124f195121335d7e
alcatel-ex.c
Posted Apr 2, 2003
Authored by netric, PoWeR PoRK | Site netric.org

This utility extracts files from the ramdisk image located in the Alcatel speedtouch home/pro modems. The format of these files had to be reverse engineered.

SHA-256 | c1c1002c5d2c54b1cc1a2ba161090170ff969c24ad9f83f1c724d17f6e9ee304
gespuis.c
Posted Mar 29, 2003
Authored by eSDee, netric | Site netric.org

Gespuis acts as an irc bouncer and exploits BitchX/Epic clients spawning a bindshell.

tags | exploit
SHA-256 | dd15eaa198ba5124d4a8fee6a3430072539d129c6f1f74f1e39e66f5101144cb
icmp.c
Posted Feb 5, 2003
Authored by netric, Gloomy | Site netric.org

This 137 byte Linux shellcode creates a remote ICMP backdoor that can be controlled trough the ping utility.

tags | remote, shellcode
systems | linux
SHA-256 | 9b7f1bf697b9a01fb4663131fe0f9e6fccb1296052337e0f27f72333d60f55df
Xsun-expl.c
Posted Nov 13, 2002
Authored by eSDee, netric, Gloomy | Site netric.org

Xsun-expl.c is a local exploit for the SPARC architecture that makes use of the Xsun -co heap overflow found in April, 2002 on Solaris 2.6, 7, and 8.

tags | exploit, overflow, local
systems | solaris
SHA-256 | 97e55a2ca5d9e617ff856cd2414f020155d9ce6262a00ab465fbed2df4dbfdb0
rc.walloffire-v0.1BETA.txt
Posted Sep 24, 2002
Authored by netric | Site netric.org

Netric Firewall Package - iptables release. This tool enables administrators to easily implement a solid firewall for iptables.

SHA-256 | 778c4cb9283f25febd472ac8a8118e5c4e02184aff15bd4e66752a4a5c7f29ec
bakkum.c
Posted Sep 23, 2002
Authored by eSDee, netric | Site netric.org

Remote root exploit for Linux systems running Null httpd 0.5.0. Tested to work against Red Hat Linux 7.3.

tags | exploit, remote, root
systems | linux, redhat
SHA-256 | f3ad09d77c82a11ae03bbf3d43ee72abb5ba62e08fc75bd608fa3668f74758b5
netric-adv009.txt
Posted Sep 23, 2002
Authored by netric | Site netric.org

Null httpd 0.5.0, a small multi-threading HTTP server, contains a remote exploitable heap overflow. Exploit code for Null httpd servers running on Red Hat Linux 7.3 is included in the advisory and can be used to spawn a remote root shell. In Null httpd version 0.5.1 this vulnerability has been fixed.

tags | remote, web, overflow, shell, root
systems | linux, redhat
SHA-256 | 95d76e6b92f65447e7530f675554f162ca32748533586a45c71c64acd8977618
netric-adv010.txt
Posted Sep 17, 2002
Authored by netric, Sacrine | Site netric.org

Atftp tftp server v0.6 and below contains multiple exploitable stack overflows. Includes local exploit.

tags | overflow, local
SHA-256 | bb7bf00e211f49a798a097f40519d7f866c03973f54108b0f2b7732def3437fa
bsd-sh.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

BSD x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.

tags | x86, shellcode
systems | bsd
SHA-256 | 5ebf0df299333aa85731a40589283c24601e346f27eb4c85540bbcb350879e59
bsd-bind-sc.c
Posted Sep 6, 2002
Authored by R00T-dude, netric | Site netric.org

150 byte BSD shellcode that binds /bin/sh to tcp port 30464.

tags | tcp, shellcode
systems | bsd
SHA-256 | 46e90d484abaafeadeec0338ba23c502fab10692f9aa3c7a492fd88c113aa870
execve.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

Linux x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.

tags | x86, shellcode
systems | linux
SHA-256 | 6cc8b3b1f1020f760ddff5d729e18b3d55edc7d5fa9c559ca025ce8ea9f1a718
bind-sc.c
Posted Sep 6, 2002
Authored by R00T-dude, netric | Site netric.org

156 byte linux shellcode which binds /bin/sh to tcp port 30464.

tags | tcp, shellcode
systems | linux
SHA-256 | b673fd25cac28c5448d67490da248acb6b14e2332d2e066519529e9e342170a0
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close