exploit the possibilities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2001-07-29

Posted Jul 29, 2001
Authored by Charles Stevenson

/usr/bin/pileup local root exploit. Tested against Debian 2.2.

tags | exploit, local, root
systems | linux, debian
MD5 | 7db2fa47bb548a4281aad6708c157b54
Posted Jul 29, 2001
Authored by Paul Nasrat

Squid can be used to port scan if set up as a httpd accelerator (reverse proxy). Tested on Redhat 7.0.

tags | exploit
systems | linux, redhat
MD5 | 3072c26d039e563fde8246ed1e61f590
Posted Jul 29, 2001
Authored by teso, scut | Site team-teso.net

TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.

tags | overflow, root
systems | linux, netbsd, solaris, freebsd, irix, openbsd
MD5 | 56fb4e5983fdf5c58663113d30bc8c33
Posted Jul 29, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Now includes open()/stat() redirection and improved netstat hiding. Removed execution redirection.
systems | linux
MD5 | 777cbd2a59268b394b79da2bda910a40
Posted Jul 29, 2001
Authored by Plastek

DEStroy-0.6.pl is a perl script which uses DES to encrypt files and makes an attempt to securely remove the plaintext. Works with ASCII and binary files.

tags | perl, encryption
MD5 | 78c7805ff62557e5be7e13d3408c8346
Posted Jul 29, 2001
Authored by Honoriak

IBM DB2 (which works under W98/NT/2000) Proof of concept Denial of Service. Sending 1 byte to port 6789 or 6790 IBM DB2 crashes, as described in ibm.db2.dos.txt.

tags | exploit, denial of service, proof of concept
MD5 | 3de9be6028bd648021d753ebaaf12c72
Posted Jul 29, 2001
Authored by Felipe Moniz | Site hideaway.net

The Stealth HTTP Security Scanner v1.0b30 provides more than 12000 http vulnerability checks. Runs on Win32 and Linux under Wine. Free.

Changes: New holes added: IDA "Code Red" Vulnerability and IIS Double Decode. Added Scan List and German language support.
tags | web
systems | linux, windows, 32
MD5 | 75e04c3946ce2203ce59ac1ca9a63f12
Posted Jul 29, 2001
Authored by Gael Roualland, Jean-Marc Saffroy | Site ippersonality.sourceforge.net

The IP Personality project is a patch to Linux 2.4 kernels that adds netfilter features: it enables the emulation of other OSes at network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting. The characteristics that can be changed are TCP Initial Sequence Number (ISN), TCP initial window size, TCP options (their types, values and order in the packet), IP ID numbers, answers to some pathological TCP packets, and answers to some UDP packets.

Changes: This release adds new manglings to fool latest versions of nmap (2.54BETA), and has lots of code improvement. Ported to kernel v2.4.7.
tags | remote, kernel, udp, tcp
systems | linux
MD5 | 47004368805cffd9ff53ac4079961c9b
Posted Jul 29, 2001
Site rootkit.com

Windows NT Rootkit v0.04 alpha - Hides processes, files, directories, has k-mode shell using TCP/IP - you can telnet into rootkit from remote. Hides registry keys - (keyboard patch disabled in this build.) Includes execution redirection.

tags | remote, shell, registry, tcp
systems | windows, nt
MD5 | 12487fc88e78176f582cbbdbd45f2575
Posted Jul 29, 2001
Authored by The Last Stage of Delirium | Site lsd-pl.net

This package contains all codes prepared for technical paper - UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes. For every discussed processor architecture samples of various assembly components are included.

tags | paper, vulnerability
systems | unix
MD5 | 3f31db7d6cb75525ecf87fdec3047b10
Posted Jul 29, 2001
Authored by The Last Stage of Delerium | Site lsd-pl.net

Unix Assembly Code Development for Vulnerabilities Illustration Purposes v1.02 - Covers IRIX / MIPS, Solaris, HP-UX, AIX, Ultrix, Linux, BeOS, and BSD. Includes system call invocation information, code specifics, "Zero free" code, ASM functionality, and examples.

tags | paper, vulnerability
systems | linux, unix, solaris, irix, bsd, aix, hpux, beos
MD5 | 024ff88ab975a35c795a04c9db0f0576
Page 1 of 1

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    3 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By