what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-01-14

bindview.nt-local.txt
Posted Jan 14, 2000
Site bindview.com

Due to a flaw in the NtImpersonateClientOfPort Windows NT 4 system call, any local user on a machine is able to impersonate any other user on the machine, including LocalSystem. We have written a demonstration exploit which allows any user to spawn a cmd.exe window as LocalSystem. All Windows NT 4.0 systems up to and including SP6a are vulnerable.

tags | exploit, local
systems | windows
SHA-256 | 1ff0cb5ad962f1a532acb051aa8b1243c8f84d3274a8fd975eedf2cc9d380959
ms00-003
Posted Jan 14, 2000

Microsoft has released a patch for a security vulnerability in Windows NT which allows a user logged onto a Windows NT 4.0 machine from the keyboard to become an administrator on the machine. Microsoft FAQ about this issue here.

systems | windows
SHA-256 | 80b57dd0c49ff28e5d18314be12dc372f60ba413b1d8e135bbfcc646f1333b9a
mi009en.htm
Posted Jan 14, 2000
Authored by Flow | Site hispahack.ccc.de

RESTRICTING A RESTRICTED FTP - How to exploit common misconfigurations in wu-ftpd that allows usersi who may not have permission to login to execute arbitrary code on the FTP server.

tags | exploit, arbitrary
SHA-256 | 43bd58be0b34b0860a305a158d415d0aef434ee84693ddc0a6bfd1b1a8a0472a
mi019en.htm
Posted Jan 14, 2000
Authored by Jfs | Site hispahack.ccc.de

A practical vulnerability analysis (How The PcWeek crack was done).

tags | exploit
SHA-256 | 5b0caddba18fc1cf57f100b5941b4cf7285e86c8efa5b46556d32dbe02b0543a
midikeys.htm
Posted Jan 14, 2000
Site oliver.efri.hr

The IRIX setuid root binary midikeys can be used to read any file on the system using its gui interface. It can also be used to edit anyfile on the system.

tags | exploit, root
systems | irix
SHA-256 | 03bb247d0172ed1737bba3d4e4230b04f38a9de92fd5b0752da235aba0b587e5
recover.htm
Posted Jan 14, 2000
Site oliver.efri.hr

The 'recover' command in Solstice Backup (Sun's relabeled version of Legato Networker) on a Unix machine authorized to perform restore operations from the backup server can be used to by a normal user to restore any file accessible to the machine in a readable-to-them state (although it cannot be used to overwrite system files). This can be used to get your own copy of /etc/shadow for password cracking purposes.

tags | exploit
systems | unix
SHA-256 | 2e259a1a7a110ea91a7f43f1a77dca658c78b5957225555efa344780d52d02ba
vi.htm
Posted Jan 14, 2000
Site oliver.efri.hr

Vi uses /tmp insecurely on OpenBSD, FreeBSD and Debian. This has been fixed in FreeBSD 2.2-STABLE, 3.4-STABLE and 4.0-CURRENT (04.01.2000).

tags | exploit
systems | linux, freebsd, openbsd, debian
SHA-256 | 0a66d13e1b0672071fa86fd276e6f2033173b2a6646c37fc1fe6802cb098a9db
httptype.1.3.0.tar.gz
Posted Jan 14, 2000
Authored by Philip Tellis | Site sourceforge.net

httptype reads a list of http hosts and optionally the port number for each of these. It queries each host, displaying the type of HTTP server running on that host, if any. It reads the http_proxy and no_proxy environment variables to determine whether to use a proxy or not. These options may also be specified through the command line.

Changes: New --debug and --trace switches for better error/bug detection, a --serveronly switch to suppress display of information other than the server type, better error messages, and a man page.
tags | web
SHA-256 | 7d5ca069e33181e1eb9cdaae0c48c8aced3d431278dedcaa9fa460b650f0cbb8
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close