what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 72 of 72 RSS Feed

Files from mu-b

Email addressmu-b at digit-labs.org
First Active2004-05-28
Last Active2023-04-03
ex211memmove-dos.txt
Posted Oct 15, 2007
Authored by mu-b | Site digit-labs.org

eXtremail versions 2.1.1 and below memmove() remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | f4094ce32bf8bf156e5f7fb5b9e60ba7cc9b4c382d687f88d69592c6297e5f71
iDEFENSE Security Advisory 2007-09-25.1
Posted Sep 26, 2007
Authored by iDefense Labs, mu-b | Site idefense.com

iDefense Security Advisory 09.25.07 - Local exploitation of an information disclosure vulnerability within the ALSA driver included in the Linux Kernel allows attackers to obtain sensitive information from kernel memory. iDefense has confirmed the existence of this vulnerability in version 2.6.22.1 of the Linux Kernel as installed with Fedora CORE 7. It is suspected that other versions are also vulnerable.

tags | advisory, kernel, local, info disclosure
systems | linux, fedora
advisories | CVE-2007-4571
SHA-256 | 949399f1ef56b7cf5b001af2d386dd168ad4fea165fb77e0c740cb6214ea3165
synscan-5.0b8.tar.gz
Posted Aug 27, 2007
Authored by mu-b, John Anderson | Site digit-labs.org

SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 3924cdfbf8c1a779b860432690b7cdfb61b87f7a8674b3c78b9a7593e21c3ed8
iDEFENSE Security Advisory 2007-08-07.2
Posted Aug 8, 2007
Authored by iDefense Labs, mu-b | Site idefense.com

iDefense Security Advisory 08.07.07 - Remote exploitation of a heap overflow vulnerability in Apple Inc.'s mDNSResponder application may allow attackers to execute arbitrary code with root privileges. The vulnerability exists within the Legacy NAT Traversal code. Unlike the core of the mDNSResponder service, this area of code does not rely on Multicast UDP. It listens on a dynamically allocated Unicast UDP port. The vulnerability occurs when parsing a malformed HTTP request. This results in an exploitable heap overflow. iDefense has confirmed the existence of this vulnerability in Mac OS X version 10.4.10, Server and Workstation, with mDNSResponder version 108.5. Previous versions may also be affected.

tags | advisory, remote, web, overflow, arbitrary, root, udp
systems | apple, osx
advisories | CVE-2007-3744
SHA-256 | 6d4ffd82d1feb8bfe7a7063ef0cd7c374ce49e3b42b3308f79af1c4ab79d31a6
imgsvr-overflow.txt
Posted Jul 11, 2007
Authored by mu-b, Tim Brown | Site portcullis-security.com

ImgSvr suffers from a stack overflow vulnerability.

tags | advisory, overflow
SHA-256 | 565d22b95eca8b9f9bc666c22a941d4f22918caf966cb2431c62ee0ee7aa6b51
safenet-dos.c
Posted Jun 11, 2007
Authored by mu-b | Site digit-labs.org

Proof of concept remote denial of service exploit for IPSecDrv.sys as shipped with SafeNET High Assurance Remote and SoftRemote versions 10.4.0.12.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | 8aa31e8ee4e11197125926ddeb59def52feef1797f372b0f920e2f3c2fb1376f
mydns-rr-smash.c
Posted May 3, 2007
Authored by mu-b | Site digit-labs.org

Remote heap smash exploit for mydns versions 1.1.0 and below.

tags | exploit, remote
SHA-256 | 383a86d6237fe7faea74e4c4c213c937a4a013765674bbfca4a5f4d139f8f3c7
synscan-5.0b4.tar.gz
Posted Apr 25, 2007
Authored by mu-b, John Anderson | Site digit-labs.org

SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 10725e496d28dfd91563bb7385d6f82ad8526ac050bf4626f0fea222130bfb8b
synscan-5.0b2.tar.gz
Posted Apr 23, 2007
Authored by mu-b, John Anderson | Site digit-labs.org

SynScan is a fast half-open port scanner. This tool will send TCP packets with the SYN flag to any block of destination addresses at very high speed. SynScan endeavors to send traffic as fast as the host network interface can support.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 47dc879fed164cbb41bec07d33de62faf97d964d92278bce0fa318c910ca12ac
extremail-v9.c
Posted Apr 23, 2007
Authored by mu-b

Proof of concept exploit that exploit a trivial stack smash in the DNS parsing code of eXtremail versions 2.1.1 and below.

tags | exploit, proof of concept
SHA-256 | 377dfe1d034e0ecff74ebda7b7ee1723d5be49dac5587f16ca0d6a9994ca2d85
rawsocket.txt
Posted Apr 2, 2007
Authored by mu-b

raw-socket ICMP/checksum shell shellcode that is 235 bytes in size.

tags | shell, shellcode
SHA-256 | 8f0bcd2b244d7627399086ddb072b42bb32cc90ecf2fa10c877287dcbea6e040
dproxy-v1.c
Posted Apr 2, 2007
Authored by mu-b

Remote exploit for dproxy versions 0.5 and below. Binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp
SHA-256 | 71d56c60f1e232a94229b71556636b01433745ed2ae92d6b6761ae4dc0da6e6e
mercur-v1.txt
Posted Mar 21, 2007
Authored by mu-b | Site digit-labs.org

Mercur IMAPD exploit that makes use of several bugs in the NTLM implementation. It gives the attacker complete control over a memcpy to a stack variable and the outcome is a denial of service (crash).

tags | exploit, denial of service
SHA-256 | 84fc3e80797cb6515674112ded1476d513c92ca06b47bff1373db7fed2520cff
mercurypown-v1.pl.txt
Posted Mar 9, 2007
Authored by mu-b

Proof of concept denial of service exploit for Mercury/32 version 4.01b IMAPD.

tags | exploit, denial of service, proof of concept
SHA-256 | 169fd76ee25ab133f610474bc1dcbf4564b17c8c7e4a1c34770b7a4568a52f81
maildisable-v4.pl.txt
Posted Mar 6, 2007
Authored by mu-b

Mail Enable Professional/Enterprise version 2.32 through 2.34 (Win32) remote exploit. Binds a shell to port 1337.

tags | exploit, remote, shell
systems | windows
SHA-256 | d6aed800fc5e11948e268ef3396c66fbfe126cef44542ce029e6669cd269b2d2
maildisable-v6.pl.txt
Posted Feb 17, 2007
Authored by mu-b

Mail Enable Professional versions 2.35 and below remote exploit. Binds a shell to port 1337.

tags | exploit, remote, shell
SHA-256 | e0d2bc41213f8df344b05c9e1cb7d29e08fa9991918f5ed0988151e5dba195bf
maildisable-v3.pl.txt
Posted Feb 17, 2007
Authored by mu-b

Mail Enable Professional/Enterprise version 2.32 through 2.34 remote exploit. Binds a shell to port 1337.

tags | exploit, remote, shell
SHA-256 | 1f224f2f0cc7562a879bfed65a13fe325aac84ab7363a3445e180ebe169dab82
maildisable-v7.pl.txt
Posted Feb 14, 2007
Authored by mu-b

MailEnable Pro/Enterprise version 2.37 proof of concept exploit that makes use of an out of bounds memory read in the NTLM authentication routines.

tags | exploit, proof of concept
SHA-256 | 8232149536e1a3a79572b4f8e18e033b75359eb3dae51b2236c5f1c0d6873713
maildisable-v5.pl.txt
Posted Feb 14, 2007
Authored by mu-b

MailEnable Pro/Enterprise versions below 2.351 proof of concept exploit that makes use of an out of bounds memory read in the NTLM authentication routines.

tags | exploit, proof of concept
SHA-256 | 0eb226440d272dd7b50d84b1d0e45df785d10d57377fc564492aed8c271a5494
doaxigen-v2.c
Posted Feb 13, 2007
Authored by mu-b

Denial of service exploit for Axigen versions 1.2.6 through 2.0.0b1 that makes use of a null pointer dereference.

tags | exploit, denial of service
SHA-256 | 1d8be3302c6c9a9cc327d00d2e6d2ec7097b1733bf7f7f3503ff13a353bc816c
doaxigen.c
Posted Feb 13, 2007
Authored by mu-b

Denial of service exploit for Axigen versions 1.2.6 through 2.0.0b1 that makes use of a single byte underflow.

tags | exploit, denial of service
SHA-256 | 42ff42379c36a0bbddfe70130572a6733ddb019470627586b6cd3e50f47378e2
sysmsg.pl
Posted May 28, 2004
Authored by mu-b

Simple UK GSM mobile network mail-bombing utility.

systems | unix
SHA-256 | fa1c075f2a2f366d0d4b7b0e0c7a3091066aaa7868feb157fd2a0044ab8735ca
Page 3 of 3
Back123Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close