exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 87 RSS Feed

Files from teso

First Active2000-02-11
Last Active2004-06-25
outp.c
Posted May 3, 2000
Authored by teso | Site team-teso.net

outp.c will convert .s files to shell code.

tags | shell
SHA-256 | a73e95b1db0a4a21d695a880d2485a1846a07cce539dcd13bafb1682d7bf7492
adv5.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit

systems | linux
SHA-256 | 6477942c86ee6dd52bac80bf956cbed6863e52d464ae92b66bef9d20f7902b03
adv4.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)

systems | linux
SHA-256 | 189114c1fe799648b677c16aa36fcc179942f685bacb5b0318c678f0cb0f01b9
advisory-009.txt
Posted Apr 7, 2000
Authored by teso | Site team-teso.net

TESO Security Advisory #9 - BinTec router security and privacy weakness. By using SNMP brute-force-techniques for SNMP community-names one is able to remotely gain the management accounts passwords, which are the same as the SNMP community names. Additionally the MIB-Tree holds security related information which should not be accessible through read-only/SNMP. These routers also offer services which can be abused rather easily, like dialing out and getting full line access via a CAPI interface, or a debugging interface which gives you all information which is sent over the BRI-lines.

SHA-256 | 1e4c21598191f4df1d64c9019b1d5c2ae2c88d693bdec2cd20552f3e94bb6c36
hellkit-1.2.tar.gz
Posted Mar 16, 2000
Authored by teso, stealth | Site team-teso.net

Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Many examples included.

Changes: Added generic shellcode decoder which can handle shellcode up to 64kb in length containing any bytes, added encoder for this type of decoder, and fixed some signedness issues in array accessment.
tags | overflow, shellcode
SHA-256 | 4de0a0428ffc7564260f6144a3a67a196db6c7af7dba15d6564be3207bbc83ca
adv7.tar.gz
Posted Mar 16, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the kreatecd application for Linux has been discovered. An attacker can gain local root-access. Exploit included.

tags | local, root
systems | linux
SHA-256 | 6b75b08c163190a2f48460df04026108041a65be6542f340bc2ebbebc83a7a66
adv6.tar.gz
Posted Mar 16, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the imwheel application for Linux has been discovered. Some of these packages are shipped with an suid-root wrapper-script that invokes the insecure program 'imwheel' with UID 0. Exploit included.

tags | root
systems | linux
SHA-256 | ce2cf3b23cb544a222d43c6fcfc4168a3bd18450577b959771583ecb4a486ae2
teso.wmcdplay.txt
Posted Mar 13, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the wmcdplay CD playing application for the WindowMaker desktop has been discovered. It allows local root compromise through arbitrary code execution.Any system which has wmcdplay installed as setuid root is vulnerable.

tags | arbitrary, local, root, code execution
SHA-256 | 8d5071c1366d929bea61249f0900db3205b2b45ad04b4e9179fa21f235aaefe6
teso.atsadc.txt
Posted Mar 13, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - The atsar application contains an exploitable vulnerability. The Halloween 4 Linux distribution, which is based on RedHat 6.1 is shipped with this suid-root program. It might be used to gain superuser privileges. Any system that has atsar-linux-1.4.2 package installed is vulnerable.

tags | root
systems | linux, redhat
SHA-256 | 506159ce20ba014e7a4a853444879fe6306bfc6bad43dc564b8b124ccdf79f23
adore-0.14.tar.gz
Posted Feb 22, 2000
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved promisc hiding, port hiding fixed, and a readme.
systems | linux
SHA-256 | de0bab345dbca650c8fba76d3b81c49404b82ffab4ed6d2f4539a87d2aad15ba
teso-nxt.tar.gz
Posted Feb 16, 2000
Authored by teso

Exploit for BIND-8.2/8.2.1 (NXT)

SHA-256 | a3fbc75a1aa8873673755bf4b5bbef3765a95fedb9fe5669407df0df343c734f
adv3.tar.gz
Posted Feb 16, 2000
Authored by teso, scut | Site team-teso.net

Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.

SHA-256 | 0aaca81a09dcafa2ee112e0e4ed74641b4256e9d1f814bdb86735574a73c2f9f
hellkit-1.1.tar.gz
Posted Feb 15, 2000
Authored by teso, stealth | Site team-teso.net

Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Examples included.

tags | overflow, shellcode
SHA-256 | f79551c7c0968751b9e2c04ed2b7d01a68b0bd7e81029b1fdf67696e615a7dd7
adore-0.13.tar.gz
Posted Feb 15, 2000
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

systems | linux
SHA-256 | ba742bd9a58e200fbed9a58044af03f4d0429b7fba2352ea510f2278ffe69410
adv2.tar.gz
Posted Feb 12, 2000
Authored by teso

Linux Kernel 2.0.x and 2.2.x local Denial of Service attack

tags | denial of service, kernel, local
systems | linux
SHA-256 | 65c147bd308b43fb3a8d7302ab87c8828f6d771f4a9f3744fbc7ec2aae17c3f8
pro.tar.gz
Posted Feb 11, 2000
Authored by teso

proftpd exploit for 1.2.0pre3 linux x86

tags | x86
systems | linux
SHA-256 | 6edee0d79957dc29f1b881883812df5000054566a9ed218b5d2bd52d14c2619a
utcl.c
Posted Feb 11, 2000
Authored by teso

cloak users utmp host entry

SHA-256 | c0c9242b12e010e91bd24cd3baa34312c62ad75a6009c50c5b81b94971b8d773
grabbb-0.1.0.tar.gz
Posted Feb 11, 2000
Authored by teso

very fast, clean and mean, but functional banner scanner, with part of the functionality of netcat :-)

SHA-256 | 8140faf86d4dda36aae57f79ae2a8d27be823118b76e22cf890009a8f15509cc
ascend-foo.c
Posted Feb 11, 2000
Authored by teso

DoS ascend router with simple udp echo<->echo link

tags | udp
SHA-256 | 3e610f9dc41e66bc8418d2222d57f4c973771ed8591575ffdb3a1eb229546188
arptool-0.0.1.tar.gz
Posted Feb 11, 2000
Authored by teso

send arp packets useful for man-in-the-middle

SHA-256 | 2bcbf6fa27b752ae133601c819f5888407f0eb48006a7b7019b0fb3f0d7d7e7c
delefate.c
Posted Feb 11, 2000
Authored by teso

Delegate 5.9.x - 6.0.x remote exploit for Linux compilations

tags | remote
systems | linux
SHA-256 | 3ac439d6fef1daef6b26daf2115caeb6dfcdd0765feefc3734a19a6d5e9886a5
dirthy.c
Posted Feb 11, 2000
Authored by teso

linux tty hijacker

systems | linux
SHA-256 | 1a7d638efbe39f49605381b9cc11b12ec8770a89dae4e2f9abcf4464e3dcc29b
ifafoffuffoffaf.c
Posted Feb 11, 2000
Authored by teso

wuftpd 2.5.0 heap-based exploit

SHA-256 | c66bbfb8e83b185de65b90f0fbc1f1d1fc5a4716ed694916c9175686d5a745e2
libtermcapsploit.c
Posted Feb 11, 2000
Authored by teso

lame libtermcap sploit

SHA-256 | f015cdddacdb0e66de98f7c3c9494337480346b8db1aff3ac5d3b0ebd0a737f4
realown.c
Posted Feb 11, 2000
Authored by teso

unix-port of the RealSever exploit from dark spyrit

systems | unix
SHA-256 | 8777ef14ae1e7f0d00c28382575cff75282e02ece3177bcc2f414162b5042261
Page 3 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close