Exploit the possiblities
Showing 1 - 25 of 77 RSS Feed

Files Date: 2001-10-01 to 2001-10-31

ptrace24.c
Posted Oct 30, 2001

Ptrace24.c is a local root exploit for linux kernels prior to 2.4.9. Works on openwall patched kernels. Uses the su, newgrp, or screen +s binaries. Originally by Nergal. Improved by sd.

tags | exploit, kernel, local, root
systems | linux
MD5 | 0b6d461adc20cb12fef2920d329f920f
sxp.c
Posted Oct 30, 2001
Authored by sd

Sendmail 8.11.5 and below local root exploit.

tags | exploit, local, root
MD5 | 4a6837286d952f1c05cba8c6fb7c9741
StMichael_LKM-0.07.tar.gz
Posted Oct 30, 2001
Authored by Tim Lawless | Site sourceforge.net

StMichael is a LKM that attempts to detect and divert attempts to install a kernel-module backdoor into a running linux system. This is done by monitoring the init_module and delete_module process for changes in the system call table. Detects most modern LKM's, including KIS.

Changes: Fixed a serious bug that could cause a kernel Oops if StMichael was not the first module loaded into the system.
tags | kernel
systems | linux
MD5 | e5cb4205fd25c95563a84be8b4fa8cf6
inflex-1.0.10.tar.gz
Posted Oct 26, 2001
Authored by Paul L Daniels | Site inflex.co.za

Inflex is an email scanner which encapsulates your existing sendmail server setup. It scans both incoming and outgoing email and it does not alter your current /etc/sendmail.cf file. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe). It can also be used to scan for text snippets within emails.

Changes: RipMIME and alterMIME were added, crontab entry was corrected, X flag for MDA, -i flag for sendmail, and "remove if blocked" and "remove if passed" options added.
systems | unix
MD5 | c268c22aed5fc7b8b4eb8585cfa9d80e
pspa-2.4.13-10.tar.gz
Posted Oct 26, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to Linux kernel v2.4 which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Ported to kernel v2.4.13.
tags | denial of service, kernel, root, patch
systems | linux, unix
MD5 | c563ac6ed47f96e1a50de512d0b0ae7e
xscreensaver-3.34.tar.gz
Posted Oct 26, 2001
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Fixed bugs causing GL crashes, Improved fading on TrueColor XFree86 4.1.x systems, a new GL hack circuit, and a new version of whirlygig.
tags | root
systems | unix
MD5 | 8243473e811c7e445e5e3cb60334ef0d
XORrwhoisd.tgz
Posted Oct 26, 2001
Authored by Sectorx

Automated rwhoisd v1.5.x remote exploit for Linux, FreeBSD, and BSDi.

tags | exploit, remote
systems | linux, freebsd
MD5 | 85a4044b6c2d041ea9e9638fd4446c40
gen.c
Posted Oct 26, 2001
Authored by CowPower

RWhoisd by NSI remote format string exploit affecting v1.5.x. Overflows the -soa directive.

tags | exploit, remote, overflow
MD5 | 0f02e4b894906177bbf4534a593a36ac
eraser52.zip
Posted Oct 26, 2001
Site tolvanen.com

Eraser is a utility for all versions of Windows which securely deletes data so it can not be undeleted easily.

systems | windows
MD5 | 658df79a6420fafa9ad4525f41c6b590
6tunneldos.c
Posted Oct 25, 2001
Authored by Awayzzz

IPV6 connection flooder which also works as a DoS for 6tunnel.

tags | denial of service
MD5 | 1d8c93ed83ec40ff9aa443bc1e0d0166
crashrouter.mrc
Posted Oct 25, 2001
Authored by Cokaine, ewadoh

Mirc script which crashes Cisco 600 series routers with CBOS of v2.4.2 or below. Uses proxies.

systems | cisco
MD5 | 97fdf05e8a3345e4711fd06920999ae7
ms01-053
Posted Oct 25, 2001

Microsoft Security Advisory MS01-053 - Binhex and Macbinary files which are downloaded in IE 5.1 for Mac OS X automatically execute, allowing attackers who run a malicious web site to run code on machines browsing the web. Microsoft FAQ on this issue available here.

tags | web
systems | apple, osx
MD5 | 901e426ee4b5428a122b3e2c99e2f545
sms.211.xntpd
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #211 - The Network Time Protocol daemon, xntpd, contains a remote vulnerability. Affected systems include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, and 5.6_x86.

tags | remote, protocol
systems | solaris
MD5 | 1d2c23f34b4b5b2044a22ee76a531612
sms.210.ufsrestore
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #210 - Another local root vulnerability has been found in ufsrestore. Vulnerable systems include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, 5.6_x86, 5.5.1, 5.5.1_x86, and 5.5, 5.5_x86.

tags | local, root
systems | solaris
MD5 | 71cca2b420f8ff96e5ada33f8b31c5f4
sms.209.rpc.yppasswdd
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #209 - A remote root buffer overflow vulnerability has been discovered in rpc.yppasswd. Vulnerable versions include SunOS 5.8, 5.8_x86, 5.7, 5.7_x86, 5.6, and 5.6_x86.

tags | remote, overflow, root
systems | solaris
MD5 | e7cdc41abec6a7e0eb42a65202ad93c3
sms.208.java.clipboard
Posted Oct 25, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #208 - A vulnerability in the Java Runtime Environment (JRE) may allow an untrusted applet to access the system clipboard. Netscape 6 is vulnerable if the JRE 1.3.0_02 or 1.3.0_01 is used. The default Java runtime environments of Netscape Navigator(TM) and Microsoft Internet Explorer are not vulnerable.

tags | java
MD5 | ab71195c8f247edae12518e705e67f7f
ms01-052
Posted Oct 25, 2001

Microsoft Security Advisory MS01-052 - The implementation of the Remote Data Protocol (RDP) in the terminal service in Windows NT 4.0 and Windows 2000 does not correctly handle a particular series of data packets, allowing a remote denial of service attack requiring server reboot to fix. Microsoft FAQ on this issue available here.

tags | remote, denial of service, protocol
systems | windows, 2k, nt
MD5 | 1bf6d8565f8cd65080a85bbe38c32501
pcat.c
Posted Oct 25, 2001
Authored by Chris Gragsone

Pcat is a utility which concatenates several libpcap (tcpdump) files into one.

tags | tool, sniffer
MD5 | 726d86ecbf8a5930fb5b52409cd0df10
StMichael_LKM-0.06.tar.gz
Posted Oct 25, 2001
Authored by Tim Lawless | Site sourceforge.net

StMichael is a LKM that attempts to detect and divert attempts to install a kernel-module backdoor into a running linux system. This is done by monitoring the init_module and delete_module process for changes in the system call table. Detects most modern LKM's, including KIS.

Changes: Began code and signature obfuscation work to conceal commonly found strings, Introduced permanent immutability to files on ext2 fs, and other misc code beautification.
tags | kernel
systems | linux
MD5 | 9f0d2f9612b1daa97a68c9678fde0348
Nmap Scanning Utility 2.54 BETA 30
Posted Oct 25, 2001
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Several windows fixes, XML functionality and fixes, fixed segfault problem with "-sU -F", improved timing accuracy.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | c43117c4a8d9f8e636398b1efe6dd00f
ptracekm.tar.gz
Posted Oct 25, 2001
Authored by MadCamel

Ptracekm is a kernel module for Linux 2.2 (Possibly 2.4, but untested) that blocks the ptrace() syscall for all users except root. This should effectively prevent local root from being gained via the latest series of ptrace() exploits.

tags | kernel, local, root
systems | linux
MD5 | a5ebea914e825721d29e4eac84215e5a
def-2001-30.txt
Posted Oct 25, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-30 - Release 2.0.0.1.0 and below of Oracle9iAS Web Cache contains buffer overflow allowing remote code execution or denial of service. Four tcp ports are affected - 1100, 4000, 4001, and 4002.

tags | remote, web, denial of service, overflow, tcp, code execution
MD5 | 18e7a790a063759516d550cd3aaa50cb
webcache.pl
Posted Oct 25, 2001
Authored by Andreas | Site defcom.com

Proof-of-concept exploit for Oracle9iAS Web Cache/2.0.0.1.0. Creates the file c:\defcom.iyd. See def-2001-30.txt for more info.

tags | exploit, web
MD5 | 6cc2f8598af0db6d419d680e0230d74a
napalm-12.txt
Posted Oct 25, 2001
Authored by napalm, Kynik | Site napalm.firest0rm.org

Napalm Magazine issue #12 - In this issue: Local DoS in Solaris 8, Why chroot(2) sucks (includes a linux kernel patch to secure it), DSL and Ma Bell, BBS list, and more.

tags | kernel, local, magazine
systems | linux, solaris
MD5 | 5a3a785934827698b837a2c669880d94
napalm-11.txt
Posted Oct 24, 2001
Authored by napalm, Kynik | Site napalm.firest0rm.org

Napalm Magazine issue #10 - In this issue: Security Holes in Remedy Client Installer, Multi-Technology Automated Reader Cards (MARC), and Chaffing as an Alternative to Encryption (Part II).

tags | magazine
MD5 | f162b209c75af5dceb8b7c4e326e65b7
Page 1 of 4
Back1234Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close