what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files from Angelo Rosiello

Email addressangelo at rosiello.org
First Active2003-02-14
Last Active2008-11-10
arcs.exe
Posted Nov 9, 2003
Authored by Angelo Rosiello, rosiello, Roberto Carrozzo | Site rosiello.org

Contest Windows binary of arcs.

systems | windows
SHA-256 | 5ee44ad0ae249826411eb70fae8ebd129dd9892e9c0eea2169267c0e5938b19b
wuftpFreeze.c
Posted Nov 4, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

WU-FTPD 2.6.2 Freezer exploit that causes a denial of service condition when a valid login can be supplied.

tags | denial of service
SHA-256 | d57268686dfb20a4d79703d2f4cddddcc0beb590b3039fcef7b38a2089a03dad
ARCS.tar.gz
Posted Oct 3, 2003
Authored by Angelo Rosiello, rosiello, Roberto Carrozzo | Site rosiello.org

A.R.C.S., or the Angelo Rosiello and Roberto Carrrozzo Stream 256 bit cipher, is an algorithm registered with the S.I.A.E. that the authors have allowed this site sole rights to host and distribute. The algorithm's theory utilizes Vernam's cipher, respecting Shannon's principles, and is based on MD5. The authors hope that someone will try to break this cipher and welcome all attempts and added research. Be forewarned, commercial use of this algorithm is forbidden without the Authors' consent. If you successfully crack this file that was encrypted with A.R.C.S., Packet Storm will send you a free t-shirt with the classic shellcode on the front of it. Supplies are limited, but we are not extremely worried. Thanks to all that help further the research and development of strong crypto.

tags | cryptography, shellcode
SHA-256 | 6436c9950463b20a49248c7880067dabc09f043214835d7de2a41f3a947cb7ec
liquidwar-exploit.c
Posted Sep 18, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Liquidwar 5.4.5 local exploit that has been tested on Slackware Linux 9.0.0 and Gentoo Linux 1.4.

tags | exploit, local
systems | linux, slackware, gentoo
SHA-256 | 6038ccaf0089d0c6b1b982024c5d6232813a117568c7c20900bb183dcfc26458
StackOverflow-en.pdf
Posted Sep 10, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.

tags | overflow
SHA-256 | 85ddc994e6b7cdd09d72c7e1a271c91908d9ccbd87b5a1ba218dbac260ff56ed
imagemagick.html
Posted Jul 20, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

ImageMagick, the popular image viewer bundled with various distributions of Linux and sometimes used as the defacto image viewer in mail clients, has a vulnerability that can lead to arbitrary code execution with the privileges of the user running the program.

tags | advisory, arbitrary, code execution
systems | linux
SHA-256 | 5a4292f4fc03c31a1515095fe313548698146bb7a2b590e49fd261404826ab6e
tcp-access.tar.gz
Posted Jun 22, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

Access utility via TCP that works much like telnetd. Supports MD5 authentication, gives a full tty, and logs everything.

tags | tcp
SHA-256 | 7173515f75b93734bc4de681cf38a90849aee75317c57d97395435a22d3227ab
rpf-1.2.tar.gz
Posted Jun 21, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.

systems | linux, redhat, mandrake
SHA-256 | 6459a4c851ab66b8349b4e3c4a5708961d44bcb8b8619a9b9ba72fa620066729
rpf.tar.gz
Posted Jun 4, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

RPM Finder Project version 1.0 is a utility that works much like the rpmfind.net site. It currently only supports RedHat but will support Mandrake and Suse in its future releases.

systems | linux, redhat, suse, mandrake
SHA-256 | d9c5fb359c7e6f5c54e12b8ab53f4c8ef840ca39788e0fc250de49320730453b
bncDoS.txt
Posted May 28, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

bnc version 2.6.2 and below suffers from a denial of service vulnerability. Armed with a valid login and password, a remote user can kill the daemon.

tags | exploit, remote, denial of service
SHA-256 | df9ba77e9a022c665d0476f11eddc0d54a32d3a4c2c210cd53987e9a5bed8326
Pi3web-DoS.c
Posted May 23, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

A simple denial of service exists in the Pi3 webserver that allows a remote attacker to crash the daemon by feeding it a GET request with 354+ forward slashes after it.

tags | exploit, remote, denial of service
SHA-256 | d0d216a28eaf4658a4d2b9ad6dbe5182010977d617055973a17d6620ae03dea4
execve-bash.c
Posted May 13, 2003
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Linux x86 shellcode (48 bytes) which does setreuid(0,0); execve("/bin/bash", NULL); exit(0);

tags | x86, shellcode, bash
systems | linux
SHA-256 | 9b5c6592a60521c7b883d20faff2a3b2f672c2706732bafb65e60fe26cd543f8
les-exploit.c
Posted Apr 25, 2003
Authored by Angelo Rosiello, rosiello | Site dtors.net

Local root exploit for a stack overflow discovered in the linux-atm binary /usr/local/sbin/les.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | f1c32981886e6334e7424c657577e8ff9d0eb02412a12110472003cb93a561e8
UDPRemoteControls.txt
Posted Apr 6, 2003
Authored by Angelo Rosiello, rosiello

This paper illustrates how to control server with the UDP protocol. It covers UDP basics, how to spoof datagrams, and gives full source code with explanations. This paper can be used in conjunction with the udp-remote-final.tar.gz package.

tags | paper, remote, udp, spoof, protocol
SHA-256 | 3416eee186ecb4a1c7798816bcd5868bc05378accefdc3c5557d1a4fbc71a12a
udp-remote-final.tar.gz
Posted Feb 14, 2003
Authored by Angelo Rosiello

This utility demonstrates a simple udp backdoor which allows for remote program execution on a Unix server.

tags | tool, remote, udp, rootkit
systems | unix
SHA-256 | 5b82b2a9f56e51c23e56fff0a2aa422ce7a192f5ef6f22bf47155bb1b3689957
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close