exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-04-22

rdist-bsd.c
Posted Apr 22, 2000
Authored by El8 | Site hack.co.za

rdist-bsd.c is a /usr/bin/rdist local exploit for freebsd.

tags | exploit, local
systems | freebsd, bsd
SHA-256 | 3c39ee0b6efc6bfe91006e554d30a0bbd9c36dc3d95f708823389f5965f0fa06
ypghost050.tar.gz
Posted Apr 22, 2000
Authored by Arny | Site hack.co.za

ypghost is a remote NIS exploit that spoofs UDP packets. Uses libpcap.

tags | exploit, remote, udp, spoof
SHA-256 | bb87cfbb877aa971c1b35751bd4906f5ec29a359da65516c007562b506662dab
sunkill.c
Posted Apr 22, 2000
Site hack.co.za

sunkill.c - Remote solaris 2.5.1 dos exploit. Opens a telnet connection on the victim machine and sends a few bad telnet negotiation options, then flooods the port with lots of ^D characters, using all available kernel memory.

tags | exploit, remote, kernel
systems | solaris
SHA-256 | 8fe99b8546ca54ea717e39b38445c9396fcd270d2358ac63e6f901fe719dcd3d
hupux.sh
Posted Apr 22, 2000
Site hack.co.za

hupux.sh hp-ux 09.04 local exploit - Takes advantage of default world writable /usr/local/bin.

tags | exploit, local
systems | hpux
SHA-256 | ff4ceda14a87f72936c2cccf417ed823558617ad5fcbae45178ab2582ae2440b
labs38.htm
Posted Apr 22, 2000
Site ussrback.com

USSR Advisory #38 - Remote DoS attack in Real Networks Real Server. The Ussr Labs team has recently discovered a memory problem in the RealServer 7 Server. By sending specially-malformed information to port 7070 the proccess containg the service will die.

tags | remote
SHA-256 | 767c71c7cc59bbd6cb2d7075cf31625110e4ad3bfc58b5529615f609cce8ae9c
ms00-028
Posted Apr 22, 2000

Microsoft Security Bulletin (MS00-028) - Procedure Available to Eliminate "Server-Side Image Map Components" Vulnerability. The FrontPage 97 and 98 Server Extensions include two components, Htimage.exe and Imagemap.exe, both contain unchecked buffers that could be used to run arbitrary code. Although part of the Server Extensions, these components also install as part of several other web server products. Microsoft FAQ on this issue here.

tags | web, arbitrary
SHA-256 | 2e69640f35ba3d473e24e33b8187613991fb8153ebd7058644650e4f8fd410c7
linux-2.3.99-pre5-securestack.tar.gz
Posted Apr 22, 2000
Authored by Karin

This is the securestackpatch by Openwall, ported for linux 2.3.99-pre5. There are no fancy configuration options, when you use this patch, next time you compile your kernel, the stack will be secure.

tags | kernel
systems | linux
SHA-256 | 8de998b9481496276ed791afea42b3403f6d88559543d5466f115c7de6cca436
whois_raw.c
Posted Apr 22, 2000
Authored by r00tabega, Lore | Site r00tabega.com

The whois_raw.cgi perl script included in all freeware versions of the cdomain package allows remote attacker to view/retrieve any system files, such as /etc/passwd, and to execute commands. Exploit included, which drops a shell, unlike previous whois_raw.cgi exploits.

tags | remote, shell, cgi, perl
SHA-256 | cdcb04dcc8c8d833822d837b47e293b61db57cc6668962ea1ef6d1dbedf1b93b
5n0r7.c
Posted Apr 22, 2000
Authored by Michel Kaempf

5n0r7 is a snort alert file parser. It sorts the alerts based on source IP, destination IP, and frequency. 5n0r7 allows one to detect attacks (portscans, probes, or whatever snort is configured to alert) right away when displaying the sorted alert file.

tags | tool, sniffer
SHA-256 | 8240c85f178c2a1cfd3e3c461cbfd3b6abb913e599def9d6fb3fbea47c507074
libsafe-1.3.tgz
Posted Apr 22, 2000
Authored by Navjot Singh | Site bell-labs.com

The libsafe library protects a process against the exploitation of buffer overflow vulnerabilities in process stacks. Libsafe works with any existing pre-compiled executable and can be used transparently, even on a system-wide basis. It works by putting a wrapper around dangerous functions that contain any buffer overflows within the current stack frame, so that the return address can not be changed.

tags | overflow, vulnerability
systems | linux
SHA-256 | ee61077d6a19cf6eb8c1238898602c3fe30e9322a56f7517f6a94a9cbd633ca2
ms00-026
Posted Apr 22, 2000

Microsoft Security Bulletin (MS00-026) - Microsoft has released a patch for the "Mixed Object Access" vulnerability in Microsoft Windows 2000 that allows a malicious user to change information in the Active Directory that he should not be able to change. Microsoft FAQ on this issue here.

systems | windows
SHA-256 | cef9d563d47988b76b7ae7637c221867eda142af7bd294ae1f501e1b7ac67813
ms00-027
Posted Apr 22, 2000

Microsoft Security Bulletin (MS00-027) - Microsoft has released a patch for a security vulnerability in Microsoft Windows NT and Windows 2000. The vulnerability allows malicious users to take some or all of the memory on an affected server unavailable, slowing or potentially stopping an affected server. Microsoft FAQ on this issue here.

systems | windows
SHA-256 | d39f9b182282d3ab7453d5ada94fcb2c6dc8d91e3269ac866d3379d5ecb41346
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close