This patch for OpenSSH 6.0 Portable adds a hardcoded skeleton key, removes connection traces in the log files, usernames and passwords both in and out are logged, and more.
91e6a90b3c87b8f7d0724216a9917a20867daf81819abb0ea42429d1ebd62e36
This patch is a backdoor to bash that will create a setuid backdoor shell in /tmp if run as root.
7f978450f62d11b175da265f7b856d733cbf051c7a1ea779218dd0d051a04d20
This patch for OpenSSH 6.0 Portable is a lightweight version of the full patch. This version strictly allows for the addition of a hard-coded password.
50a054b3adfc63057235aeb9695006fc8e638c278b6eaaa6e062c18e1d54adf0
A shellcode that automatically obtains the highest available uid to setuid().
4992fdaec9c45eea8c9813a40f77d568c2c61c9efef684ef291db214b197d926
Smart shellcode which prompts the user for the uid to setuid() with.
ad5249bda8d4fde51167d66b3b19ab600597794ec067f9bc632a8aaef4535f83
Exploit for Yahoo Messenger, Yahoo Module that allows for remote command execution on a victim machine via bad URI handling. Requires the victim to view the html.
de57f77d0570f6c0cef77345b9c3a45bdf07eb7947748433529550f3a4693e1a
Yahoo Messenger 5.5 and below suffers from a buffer overflow that was originally discovered and fixed in May of 2002, but has since resurfaced. Systems Affected: Windows NT/2000/SP1/SP2/SP3, Windows ME, Windows 95/98, Windows XP.
3dbd08466a589690e261f4eb0f747ba191bda6e704b3f88ec4d48204eb593792
A paper that details the manipulation of the destructor when utilizing a buffer overflow, a format string attack, or corrupting a malloc chunk.
9ca183559ae54fd97c38cdc1cdabdfb443407e4dead2e88e1c635a606ab6c42d
Firebird has 3 binaries: gds_inet_server, gds_drop, and gds_lock_mgr, which all use insufficent bounds checking in conjunction with getenv(), making each one susceptible to local exploitation. Enclosed are two local root exploits tested against versions 1.0.0 and 1.0.2 on FreeBSD.
7841bcf9369b0cfc917765429ceb7118d676bfc4a650b097f57716bfab790d9a
Cpanel 5 and below remote exploit which allows users to view any file or execute remote commands due to an insecure open call in guestbook.cgi. Local root vulnerabilities also exist.
872dc79f37bab68ceed000840eafddb4a2ece4fdb910242de487ea4a95d25073
Nethack v3.4.0 local buffer overflow exploit which spawns a shell as uid=games. Runs /usr/games/lib/nethackdir/nethack.
d36c9676766104ed6f0e30024d355ec827f58589e60d86e963361827c6ef5db0
Buffer Overflows for Kids part 2 - This is part two, the follow on from bofs4kids. In this tutorial I am going to attempt to give you the knowledge to be able to e exploit a program, without coding in C. But we will need to use gdb quite a bit, so any prior knowledge would be helpful but not necessary.
39a87ffcaf6f339e334dc1cda6f41e33561a41b19cd6e1c899d2b2fa9e343ef2
This tutorial is not going to teach you how to code an exploit, but what it is going to do is give you a good understanding of what a buffer overflow is, what types of buffer overflows there are, how we would go about exploiting a buffer overflow, and how to identify a buffer overflow. C and ASM knowledge is not required.
3b09e6c7b77a96b63d7b66bb3c986b732511691a13617d29880e2b53c3d34f5a
Bish.c is multi-platform shellcode tested on FreeBSD 4.6-PRERELEASE, FreeBSD 4.5-RELEASE, OpenBSD 3.0, NetBSD 1.5.2, Linux 2.0.36, Linux 2.2.12-20, and Linux 2.2.16-22. Based on code by Zillion, added setuid().
74d9b908afde9dc5d569ea71e671de85b3c81ce631b4ef0d9bb20b74743289f2
Finding Vulnerabilities - This paper explains the auditing of C source code to find application exploits. Includes a practical example of how to hack an IDS that was coded for a website.
9a48e28edc710e3b6eb7dfe1ecba2cec826785f99ff2ef8c0174fa6e04e4a18c
Shellcoding - How to write shellcode for Linux/x86. Includes parts I + II.
ab9b8ac49332beb7d33224ea976173ece2c5d27c3e8ef84a8f08f0888ea062bf
Linux x86 shellcode which does a chmod("//bin/sh" ,04775); set sh +s.
73a8c94b4834ab4ee35bd22fb4b7e554437291febd01c57f6bcc0097963686f5
Linux x86 shellcode which does a write(stdout,"bob from DSR", 15); exit;.
04c216d2661400f510d03ed170a51474fea2bbbd044a369889d0cc9dbb7ae928
Linux x86 shellcode which does a setuid(); execve(); exit();.
fcc33d1d4463f6e6216c770d49c99329c3d91bd9514881a689a27f43b566c7b2
Linux x86 shellcode, to open() write() close() and exit(), adds a root user no-passwd to /etc/passwd.
ecb8d8439ae492600571dd2b132d0cd576f63a9529137b7ed872348f993c984e
Linux x86 shellcode which does execve()/bin/ash; exit; in 34 bytes.
1c5867190284199a34f431a90516c4ad9cc0b7800020a274f5ca0999fa97fafe
Linux x86 29 byte shellcode.
48560a596340c96401aef340150dccc2653630871f8e1d9de9742ee45cb25fac
This Proof of Concept exploit for the current directory traversal design flaw in apache 2.0.x - 2.0.39 allows any attacker to view any file on the target machine. Original vulnerability found by Luigi Auriemma. Affected Systems: Windows [win32], Netware, OS2, Cygwin.
6aceadaa5b57140304df3527499731b71b0374b1690f5244471132425d9e168d
PHP v4.2.0 and 4.2.1 with Apache 1.3.26 POST bug proof of concept exploit for x86. Produces a segmentation violation (signal 11).
e1e66701c77072a167c7aa5778b3d30cc69da1019bee73ce24e76872d8212be9
Backdoors Bash-2.05 for local root.
a091c406eec0646458840e3613e28a2adfa1c29709189adf1882c67b9ae23876