what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 61 RSS Feed

Files from realhalo

First Active2000-03-08
Last Active2002-02-27
xrcvtty.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0/4.0 /usr/contrib/mh/lib/rcvtty local exploit - Gives a egid=4(tty) shell.

tags | exploit, shell, local
SHA-256 | 97df13bd07d261bb87a10c4f6335d25e1cca2a73e97e369c44265dec113c0303
bsdi_inews.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 local Inews (inn-2.2) buffer overflow exploit. Gives egid=news shell.

tags | exploit, overflow, shell, local
SHA-256 | ea9a24a0938e3ecdaf81b1eb284380066bc47043343c111cae4471b9d5273e75
bsdi_sperl.c
Posted Dec 3, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/bin/suidperl local root exploit.

tags | exploit, local, root
SHA-256 | 58941d3c91d8b42f6784c8091f0c39755ddd7d5f6ad6a1825b63d7ab8c720c3c
bsdi_inc.c
Posted Nov 29, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.

tags | exploit, local, root
SHA-256 | ed628d1321ba3d0225a71dc5d95a94974deec4e382e6feef884016cddda04dd0
bsdi_elm.c
Posted Nov 16, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI Elm 2.4 local buffer overflow exploit. Tested on BSDI/3.0, gives a group mail shell.

tags | exploit, overflow, shell, local
SHA-256 | 6a330ce2fc59bf584d239c77e5b345d9e7bb1abdf51acce4a1c2b43634c09ae2
deb_gnomehack.c
Posted Nov 16, 2000
Authored by vade79, realhalo | Site realhalo.org

Gnomehack v1.0.5 local buffer overflow exploit which gives a egid=60 (games) shell if gnomehack is sgid (2755), tested on Debian 2.2. The same bug also affects Nethack.

tags | exploit, overflow, shell, local
systems | linux, debian
SHA-256 | 816be742420d036d0db3dc9087eb0fb8b2fcf51694ed67304fa2c176d19a55ca
bsdi_filter.c
Posted Nov 14, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI /usr/contrib/bin/filter v2.* local buffer overflow exploit. Tested on BSDI 3.0, provides a shell with GID mail.

tags | exploit, overflow, shell, local
SHA-256 | e534fc0c8aa82b47dead2e0e671e1935ad2cdccabd46b611e35f366b86b24a78
xrestore.c
Posted Nov 4, 2000
Authored by vade79, realhalo | Site realhalo.org

Restore (/sbin/restore) v0.4b15 local root exploit. Tested against Redhat 6.2.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | 25b1655a9902e87c0615e5d189cded02d9d32a74028c352acca92baf010d53b9
xzarch.c
Posted Oct 21, 2000
Authored by vade79, realhalo | Site realhalo.org

Linux /usr/games/zarch v.92 local root buffer overflow exploit.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | d420c219019c22b1db498fbe394d018774d0fc7f953b8a9a311f957a40202d37
xsplumber.c
Posted Oct 21, 2000
Authored by vade79, realhalo | Site realhalo.org

Linux space plumber (/usr/games/splumber) local buffer overflow exploit.

tags | exploit, overflow, local
systems | linux
SHA-256 | 807d031351ea5f76324fc2b5994894828847822ca1112cab19cbaff5f38514e9
Gopher2.3.1p0.c
Posted Sep 8, 2000
Authored by vade79, realhalo | Site realhalo.org

Gopher2.3.1p0 and below has many overflowable functions in the daemon. Most of them overflow with hardcoded data that gets passed along - making it not possible to change any pointers. The "halidate" function contains an exploitable buffer overflow - exploit code for linux included. Note: This is not related to the other vulnerability, authenticate.c, which has since been patched in 2.3.1p0. 2.3.1p0 is vulnerable to this.

tags | exploit, overflow
systems | linux
SHA-256 | c9a967732b2e2119e924d33a9e324290a5f84f712275f52f3cd713c43b128f87
killbnc.c
Posted Sep 8, 2000
Authored by vade79, realhalo | Site realhalo.org

BNC 2.6.4 remote denial of service exploit. Causes all users who are connected to IRC by BNC by exhausting the resources of the BNC server.

tags | exploit, remote, denial of service
SHA-256 | 2b404efc7917d8d05e17566fbbda6f862e58ad17893ed5aac38f790bba57dbeb
xslrnpull.c
Posted Aug 22, 2000
Authored by vade79, realhalo | Site realhalo.org

Slrnpull.c exploits a local buffer overflow vulnerability in slrnpull version 0.9.6.2, which is setgid news. Tested against RedHat 6.2.

tags | exploit, overflow, local
systems | linux, redhat
SHA-256 | 416129da6ec1a149669dbfa4d033e8be06cf479f020fc5eefda50e6ade9d3fc9
xgopher.c
Posted Aug 12, 2000
Authored by vade79, realhalo | Site realhalo.org

Gopher+ daemon v2.3 remote root buffer overflow exploit - Tested against Slackware Linux 3.6 and 7.0. Adds a line to /etc/passwd.

tags | exploit, remote, overflow, root
systems | linux, slackware
SHA-256 | 9c2f2d4a91a62e040ddd61ebd3561c42d0097168294f3951f1f9d91c91fab2e1
tin_bof.c
Posted Aug 5, 2000
Authored by vade79, realhalo | Site realhalo.org

Tin v1.4.3 local linux/x86 buffer overflow exploit which spawns a gid=news shell if /usr/bin/tin is setgid.

tags | exploit, overflow, shell, x86, local
systems | linux
SHA-256 | a8dfb59501a701151245b97b74716f47642a1e40df90d8842f5f19a4ea396324
dune_poc.c
Posted Jul 20, 2000
Authored by vade79, realhalo | Site realhalo.org

The Dune Webserver v0.6.7 has remotely exploitable buffer overflows. This code is a proof of concept exploit for linux/x86.

tags | exploit, overflow, x86, proof of concept
systems | linux
SHA-256 | 959582ca4a5d776e191b1bf9c713d5e8b9a9f1b81e495b3b70a6368fbe9afa9f
tetrinet_dos.c
Posted Jul 12, 2000
Authored by vade79, realhalo | Site realhalo.org

Tetrinet v0.6 for linux denial of service exploit. If a user on the local network sends an encrypted string and disconnects before the login is completed, the Tetrinet server exits with a broken pipe.

tags | exploit, denial of service, local
systems | linux
SHA-256 | eade1092a1446a89cdd3abe32e722299cf310cac965b8038dcba3b09b7b7ca8f
getenv.pl
Posted Jul 4, 2000
Authored by vade79, realhalo | Site realhalo.org

Getenv.pl allows you to find buffer overflows in a unix binary by finding getenv() calls.

tags | tool, overflow
systems | unix
SHA-256 | 57f50d3ff335c0dfd414ed424f6a20d8849ef9b8d0e14b9e739b7a6b33927a50
xfwm_bof.c
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xfwm buffer overflow exploit for Linux / x86. This will give you a euid=0 shell if /usr/X11R6/bin/xfwm is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
SHA-256 | 43eac56faef522e18d373dc452cee020f39fd7369f6f0bda40e910c89734352f
xwhois_bof.c
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xwhois buffer overflow, for Linux x86. This will give you a euid=0 shell if /usr/X11R6/bin/xwhois is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
SHA-256 | cd3e6d87b5d6caa673ead4be3dac43675e7efaff01e57544d0ab5add0bd7a2fc
2dopewars_exploits.txt
Posted Jun 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Dopewars 1.47-current has two local security holes. Dopewars is SGID games. Remote buffer overflows also exist.

tags | exploit, remote, overflow, local
SHA-256 | 0f42ff1b37e66d07b86bb87e247d94963fa74c6ecd4315816a593792519e5108
inews_bof.c
Posted Jun 24, 2000
Authored by vade79, realhalo | Site realhalo.org

Inews (inn-2.2) local buffer overflow - provides a gid=news shell if /usr/bin/inews is SGID. Includes perl script to find the offset.

tags | exploit, overflow, shell, local, perl
SHA-256 | b6fc73939a2932fcb984c5650ed44060c75fc8ec9c6504577440ac635fc07b5b
pine_bof.c
Posted Jun 19, 2000
Authored by vade79, realhalo

Pine v4.10-21 local buffer overflow - drops a gid=mail shell if /usr/bin/pine is SGID. Tested on Debian slink2.1.

tags | exploit, overflow, shell, local
systems | linux, debian
SHA-256 | 7764b61d5684322567f4c2b7d67debaf0db0e2c30bbcecd3de3c2f2533e14b92
wmnetmon_bof.c
Posted Jun 19, 2000
Authored by vade79, realhalo

Wmnetmon v0.2 buffer overflow exploit for Linux - Provides a euid=0 shell provided /usr/X11R6/bin/wmnetmon is suid root, as it is by default. Includes perl script to try all offsets.

tags | exploit, overflow, shell, root, perl
systems | linux
SHA-256 | 86bef23e564b83a03659996407371bf9b0c8902fe578e15b80db3ca10affd2eb
Mail_bof.c
Posted Jun 1, 2000
Authored by vade79, realhalo | Site realhalo.org

/usr/bin/Mail local linux exploit which gives gid=12 shell. Tested against Slackware 3.6 and 7.0.

tags | exploit, shell, local
systems | linux, slackware
SHA-256 | fed3606029a826006dd84ce7fd68f8f7eb73b112fa86dd79c0364186eaf429cf
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close