exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 61 of 61 RSS Feed

Files from realhalo

First Active2000-03-08
Last Active2002-02-27
slirp_bof.c
Posted May 31, 2000
Authored by vade79, realhalo | Site realhalo.org

Slirp v1.0.10(RELEASE) local buffer overflow exploit for Linux which gives you a SGID shell if /usr/local/bin/slirp is mode 2755. Tested against Slackware 3.6. Includes perl script to find the offset.

tags | exploit, overflow, shell, local, perl
systems | linux, slackware
SHA-256 | 12e61b047e8d24718f434c4d48b7b220b125ea133744046125a247842e78d76a
elm_last.c
Posted May 31, 2000
Authored by vade79, realhalo | Site realhalo.org

One last elm v2.4 / v2.5 exploit - gives EGID 12. This version works against almost all vulnerable versions of elm.

tags | exploit
SHA-256 | 47fefa5230db61d38f353f0a5b82b73f911a8e966cb50c54a8092a788c5e4d9e
elm_again.c
Posted May 27, 2000
Authored by vade79, realhalo | Site realhalo.org

elm_again.c exploits another buffer overflow in elm v2.5 giving a gid=12 shell if /usr/bin/elm is SGID. Tested on Slackware 3.6 and RedHat on elm2.5PL3.

tags | exploit, overflow, shell
systems | linux, redhat, slackware
SHA-256 | a63af30bfc97eb80e07b9f38915a5c778463721196ce3c7f4a6bf9172b6729c7
elm_bof25.c
Posted May 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Elm v2.5 buffer overflow exploit which provides a gid=12 shell if /usr/bin/elm is SGID. Tested on elm 2.5PL1-3, on Red Hat. Perl script to find offsets included.

tags | exploit, overflow, shell, perl
systems | linux, redhat
SHA-256 | de3ca64288f925a9826cafbf271fc6605aa272bb27361e89cf5913320a7c513f
elm_bof24.c
Posted May 26, 2000
Authored by vade79, realhalo | Site realhalo.org

Elm v2.4 buffer overflow exploit which provides a gid=12 shell if /usr/bin/elm is SGID. Tested on Slackware 3.6, elm 2.4PL25. Perl script to find offsets included.

tags | exploit, overflow, shell, perl
systems | linux, slackware
SHA-256 | 03d1978ea3b8ab5173fda42c7786dc04993514aae31b5c97466470d36a8dddcf
sendfile.pl
Posted May 14, 2000
Authored by vade79, realhalo | Site realhalo.org

sendfile.pl is a tool which uses echo to send files to any webserver which has an unchecked open() call in a cgi script.

tags | web, cgi
SHA-256 | 7c555f235208e9dcdbdb3351234decf73f56993d31d16ac5d34bf257b6e64390
netsolbug.txt
Posted May 9, 2000
Authored by vade79, realhalo | Site realhalo.org

Major security issue with networksolutions.com(easysteps.pl). This is being distributed amongst the irc.

tags | exploit
SHA-256 | 5bb0b27956ea17dfff4e3397488439c628f1b4637003f3b6a938c243e772152c
ide_expl.mrc
Posted Apr 19, 2000
Authored by vade79, realhalo | Site realhalo.org

ide_expl.mrc is an ircii-4-4 exploit ported to mirc5.7, works reverse to ircii-4.4.c. You send the chat request instead of having them chat you, attempts to execute /bin/sh.

tags | exploit
SHA-256 | 07bb96538921b3cdfee62b6c246d8843f69f27f4c4ae7b182d900f7f81eee2fb
readdev.txt
Posted Apr 11, 2000
Authored by vade79, realhalo

Documentation on possibilities to freeze/deny service to applications and daemons via reading devices on unix/windows based operating systems. (unix note: most of these device calls don't require root, on most dists) Includes some sample html for crashing browsers through file:// links.

tags | denial of service, root
systems | windows, unix
SHA-256 | d7c8deedc35391eaa333c07710195642bccfa5468ade29076a0bcabc58fa637c
avscan.pl
Posted Apr 8, 2000
Authored by vade79, realhalo

AVscan is a perl script which submits garbage queries to altavista in order to find hosts to scan.

tags | tool, scanner, perl
systems | unix
SHA-256 | 65e888ac12d49818985f0d7d38052033f23c495205dab54bd382351a34d7d7ae
httpd_flood.pl
Posted Mar 8, 2000
Authored by vade79, realhalo

Most webservers can be DoS'd by creating a large number of tcp connections from the same host. Simple, lame, and not spoofed, but effective nonetheless.

tags | denial of service, spoof, tcp
SHA-256 | 742f8b8c58b74086dd6f9e8870807bede34139f4d3d48adb713b24fbf53308f2
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close