exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-03-20

beamcrack.zip
Posted Mar 20, 2000
Authored by Kingpin | Site l0pht.com

BeamCrack is a simple application that will set or reset the bit in each application's database header which tells the launcher that it should or shouldn't be beamable, thus bypassing the PalmPilot's infantile copy-protection.

SHA-256 | 217629f25097a18e38f40fa24472ef4c6bc44bbf1af6810bb6f8fd8c62739cb8
cisco.pix-ftp.txt
Posted Mar 20, 2000
Site cisco.com

The Cisco Secure PIX Firewall interprets FTP (File Transfer Protocol) commands out of context and inappropriately opens temporary access through the firewall. This is an interim notice describing two related vulnerabilities.

tags | vulnerability, protocol
systems | cisco
SHA-256 | d9dd5eea66870d2029e813abe94d615ab12458e3e984c0e779c9e025f32d89b2
findfixed.pl
Posted Mar 20, 2000
Authored by Missinglnk | Site tribune.intranova.net

Findfixed.pl searches through C code looking for fixed-length buffers.

systems | unix
SHA-256 | 01d0d1983a1244903c29f0891f8551f178f9ab00f53ef34a47f1e24869d2240d
gpm-root.sh
Posted Mar 20, 2000
Site hack.co.za

A vulnerability exists in the gpm-root program, part of the gpm package. A local console user can obtain root. Tested under RedHat Linux (6.2 / 6.1 / 6.0 / 6.0 / 5.2 / 5.1) and Debian Linux (2.2 / 2.1 / 2.0).

tags | exploit, local, root
systems | linux, redhat, debian
SHA-256 | fdc7878064ad331939f1b74e447a8ba7472f14e883ff96a2f93eaecb0a3154f5
imexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween 4 local root exploit for imwheel-solo. Other distros maybe affected as well.

tags | exploit, local, root
SHA-256 | 7300584731a280968e5f1a1b1f9f36318180b511c516ed48887ec106be3e6d96
isoaq61.zip
Posted Mar 20, 2000
Site connect.to

Good crack for ICQ, the best. Trust me.

SHA-256 | a61ee154ca244e2327bc6274756a3f6dd0a2acb2de4c3b3937f7c3d07e33f73a
led_color.c
Posted Mar 20, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

Overflows the -l arg buffer in wmcdplay due to a bad sprintf call. Tested on Mandrake.

tags | exploit, overflow
systems | linux, mandrake
SHA-256 | dcaf4f08e182ca245fd5a67f7a6513167be09b045d4dbb23c1b92103c9d70d18
melik.zip
Posted Mar 20, 2000
Site connect.to

Meliksah nuke v2.5 is one of the best nukers in existance.

tags | denial of service
SHA-256 | 88c8fbd4dd392ec27178cf0c79fd32e85cee7441269a899f38532cd24bd1a301
printtool.sh
Posted Mar 20, 2000
Authored by Phonic | Site hack.co.za

printtool is an X11 printer configuration tool shipped with RedHat Linux and possibly other linux distributions. When configuring a printer with printtool, the permissions of the config file are set world-readable. When this happens, this script will kick in and give you the password.

tags | exploit
systems | linux, redhat
SHA-256 | 7595d758939654cb1d717d248da15ef5cdd8257cceeab9d8435768872eebf6a1
reset_state.c
Posted Mar 20, 2000
Authored by Andrew Alston

reset_state.c exploits a recent bug in pix firewalls which drops an entry in the state table when a rst packet is received.

tags | exploit
SHA-256 | fbd4f85d44914f1cf74917bc5237cc57b2f2878219c337a7f80ec6aed8e49709
spawncmd.pl
Posted Mar 20, 2000
Site hack.co.za

Spawn a command shell on remote host with MSADC.

tags | exploit, remote, shell
SHA-256 | 3b3d993144d7e5d8ebee215008210e705944ca13dfff4aadcaaf701627f586af
wmexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween Linux 4.0 and Debian Linux 2.1 local root exploit for wmcdplay. Other distros are maybe affected as well.

tags | exploit, local, root
systems | linux, debian
SHA-256 | b9017f7829fe03f891ee34fded6071de2ba1348fee2276fddd5db8f9193120dc
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close