what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 113 RSS Feed

Files from Kingcope

Email addresskingcope at gmx.net
First Active2004-04-11
Last Active2019-05-22
Oracle MySQL Server 5.5.19-log Stack-Based Overrun
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL versions 5.5.19-log and below for Linux suffer from a stack-based overrun. This exploit yields a shell as the mysql uid.

tags | exploit, overflow, shell
systems | linux
advisories | CVE-2012-5611
SHA-256 | 5230a2630c6fb8619813731a9429b6e733b55892232e63ae4cde28452b203583
IBM System Director Remote DLL Load
Posted Dec 3, 2012
Authored by Kingcope

By sending a specially crafted request to a vulnerable IBM System Director sever, an attacker can force it to load a DLL remotely from a WebDAV share. Versions 5.20.3 and below are vulnerable.

tags | exploit
advisories | CVE-2009-0880
SHA-256 | 5b0844509e5300f20406447ea01c59ffdb5453dd39d48137328aaef28c1026af
MySQL 5.1 / 5.5 Windows Remote Root
Posted Dec 3, 2012
Authored by Kingcope

Oracle MySQL versions 5.1 and 5.5 remote Windows SYSTEM level exploit.

tags | exploit, remote
systems | windows, unix
SHA-256 | f3023f8e5dad3f5eb619145479b0d58584e658bc580c2f13e14122becac5c7b0
MySQL Login Scanner
Posted Oct 6, 2012
Authored by Kingcope, mu-b, John Anderson

This is a modified version of synscan that checks credentials against MySQL instances and logs the output to mysqljack.pot.

tags | tool, scanner, sql injection
systems | unix
SHA-256 | 24847c2c7a4902a7f34c01a46299bad29d65594d3c31354d49f56ff691b37f51
Linux udev Netlink Local Privilege Escalation
Posted Sep 14, 2012
Authored by Kingcope, Jon Oberheide, egypt | Site metasploit.com

Versions of udev < 1.4.1 do not verify that netlink messages are coming from the kernel. This allows local users to gain privileges by sending netlink messages from userland.

tags | exploit, kernel, local
advisories | CVE-2009-1185
SHA-256 | a339530d415e4d147ac5e6556a603790385a27c54518e11e95069181161f0615
Pure-FTPd 1.0.21 Denial Of Service
Posted Aug 14, 2012
Authored by Kingcope

Pure-FTPd version 1.0.21 crash proof of concept exploit that leverages a NULL pointer dereference.

tags | exploit, proof of concept
SHA-256 | c2280992211c9ea41ac2e2ddf61f4ee7e7455a52f000ddfb5f9302a7a81ccbc0
BSD telnetd Remote Root
Posted Jul 2, 2012
Authored by Kingcope

This is a BSD telnetd remote root exploit supposedly stolen from Kingcope and posted on mailing lists.

tags | exploit, remote, root
systems | bsd
SHA-256 | 86d6caae381ef38095dc163860a232ba735cc819e871d06ba7f5220da75fd8fc
Microsoft IIS 6.0 / 7.5 Authentication Bypass
Posted Jun 11, 2012
Authored by Kingcope

Microsoft IIS versions 6.0 and 7.5 suffer from various authentication bypass vulnerabilities. 7.5 also suffers from a source code disclosure flaw.

tags | exploit, vulnerability, bypass
SHA-256 | 31f691d3442ef019996f5131a36d46a349b82fb445d8c3c399201566683d7edb
Uncovering ZeroDays And Advanced Fuzzing
Posted May 24, 2012
Authored by Kingcope

This is a presentation called Uncovering ZeroDays and Advanced Fuzzing. It has one PDF of the presentation and one of the full script used during the presentation. This was presented at AthCon 2012.

tags | paper
systems | linux
SHA-256 | ed4e76db85a1968d96d0b168a230dcf62722f0fc8e23574007b3bcc95e50099c
Apache Tomcat WAR Upload / Account Scanner
Posted Mar 19, 2012
Authored by Kingcope

This exploit attempts various Tomcat login access combinations and attempts to launch a reverse shell once successful.

tags | exploit, shell
SHA-256 | a2e159759962b6d655826f6b3f358ab355518287e8ff7d0e4690a59f258c175f
Linux IGMP Remote Denial Of Service
Posted Jan 18, 2012
Authored by Kingcope, Ben Hutchings, Firestorm

Remote Linux IGMP denial of service exploit for a vulnerability introduced in kernel 2.6.36.

tags | exploit, remote, denial of service, kernel
systems | linux
advisories | CVE-2012-0207
SHA-256 | 3f774420cceb820eadca2d64adb8e8aef38d2ecaaf08171ea9586e48b2e73616
Serv-U FTP Server Jail Break
Posted Nov 30, 2011
Authored by Kingcope

Serv-U FTP server suffers from a remote jail breaking vulnerability.

tags | exploit, remote
SHA-256 | 69f0832074081c550ccae5d7f3afc1b4046cc0632090e235f13b3fc2d70e5155
ProFTPd / FreeBSD ftpd Remote Root
Posted Nov 30, 2011
Authored by Kingcope

Remote root exploit for FreeBSD ftpd and ProFTPd on FreeBSD. It leverages the fact that /etc and /lib can be modified inside of the chroot.

tags | exploit, remote, root
systems | freebsd
SHA-256 | f59b24d7a9bf8446fb65b25ad7046e1b91fd2198e39bf16f0a7f6d2431d9e848
Daytona JBoss Exploitation Kit
Posted Oct 14, 2011
Authored by Kingcope

This is the full Daytona package that houses three remote JBoss exploits with authentication bypass. They are ported from Metasploit and beefed up with two scanners.

tags | exploit, remote
SHA-256 | 3a7c10344dc210d299bebed708f49b6d1eb9c05deab6be158b3a1745486177bf
Apache httpd Remote Denial Of Service
Posted Aug 19, 2011
Authored by Kingcope

Apache httpd remote denial of service memory exhaustion exploit.

tags | remote, denial of service
SHA-256 | 5fdda8b150aea034561a2b99bc1c71da2c6f225ee078695da41e6e725f0e4a7d
Microsoft IIS FTP Server 7.0 Stack Exhaustion
Posted Jul 3, 2011
Authored by Kingcope, Myo Soe | Site metasploit.com

This Metasploit module triggers a denial of service condition in the Microsoft Internet Information Services (IIS) FTP Server versions 5.0 through 7.0 via a list (ls) -R command containing a wildcard. This exploit is especially meant for the service which is configured as "manual" mode in startup type.

tags | exploit, denial of service
advisories | CVE-2009-2521, OSVDB-57753
SHA-256 | 575fed5c9101b9e2345bf64ca7b5f2b1ca4205c300ba8af0446db71f25d0eed2
OpenSSH 3.4p1 FreeBSD Remote Root Exploit
Posted Jul 1, 2011
Authored by Kingcope

OpenSSH version 3.4p1 remote root exploit for FreeBSD.

tags | exploit, remote, root
systems | freebsd
SHA-256 | 784ac2c808aee05f8e7a89a108734acf1284cde95b4a09f41ebde5b82c0728af
OpenSSH 3.5p1 Remote Root Exploit For FreeBSD
Posted Jun 30, 2011
Authored by Kingcope

Remote root exploit for OpenSSH version 3.5p1 on FreeBSD that affects versions 4.9 and 4.11. Other versions may also be affected. The bug appears to reside in auth2-pam-freebsd.c.

tags | exploit, remote, root
systems | freebsd
SHA-256 | b0a72514bab1b654a9acc1539d19dc102efa3d5f89c49d95b1b5b7dae0a88734
JBoss Application Server Remote Exploit
Posted Mar 4, 2011
Authored by Kingcope

JBoss Application Server remote command execution exploit for instances running on either Windows or Linux.

tags | exploit, remote
systems | linux, windows
SHA-256 | 9334c5c75c7639d2db62091242226924783ba61ae3fe5d5895dd5fa97e45c898
Mac OS X FTPd Disclosure
Posted Feb 14, 2011
Authored by Kingcope

Mac OS X suffers from a ftpd related information disclosure vulnerability.

tags | exploit, info disclosure
systems | apple, osx
SHA-256 | c7e1f64cd4e638d0f9d91eb82e75faafba3b340b73fe38afbb8d624256f950a1
ProFTPD mod_sftp Integer Overflow
Posted Feb 7, 2011
Authored by Kingcope

ProFTPD mod_sftp integer overflow denial of service proof of concept exploit.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | 8be96176ffeabb738a525695e7d76457f45c838d9df2d027c6217df3d5d527c2
FreeBSD 5.4-RELEASE ftpd Memory Leak
Posted Feb 7, 2011
Authored by Kingcope

FreeBSD versions 5.4-RELEASE and below ftpd version 6.00LS sendfile kernel mem-leak exploit.

tags | exploit, kernel
systems | freebsd
SHA-256 | eefed0dbbad6b3a33771d66d5982aa28599fb1b4cd1b98cee1510a3870d2da9a
Attacking Server Side XML Parsers
Posted Feb 2, 2011
Authored by Kingcope

Whitepaper called Attacking Server Side XML Parsers.

tags | paper
SHA-256 | 0f965f93708f4321b9c5655c6b1dd542898ed6a87ee0ea9523d55f8980f547ab
FreeBSD Local Denial Of Service
Posted Jan 28, 2011
Authored by Kingcope

FreeBSD local denial of service exploit that causes a forced reboot.

tags | exploit, denial of service, local
systems | freebsd
SHA-256 | 74e9ff916c830d783aa31aad9f51279b50bb6492d981404c7bf0b44fa6c5ff54
Sun Microsystems SunScreen Firewall Root Exploit
Posted Jan 24, 2011
Authored by Kingcope

Sun Microsystems SunScreen Firewall local root exploit that spawns a shell on tcp port 1524.

tags | exploit, shell, local, root, tcp
SHA-256 | 48b25d9b1d67e00e988fa7f1f96311c9fd7c9980d28849043cb2bb94b55c28fd
Page 2 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close