Phrack Magazine Issue 58 - In this issue: Advanced return-into-lib(c) exploits (PaX case study), Runtime binary encryption, Advances in kernel hacking, Linux on-the-fly kernel patching without LKM, Linux x86 kernel function hooking emulation, RPC without borders, Developing StrongARM/Linux shellcode, HP-UX (PA-RISC 1.1) Overflows, The Security of Vita Vuova's Inferno OS, Phrack Loopback, Phrack World News, and more.
ee77a8d4f48fe30a69ff0924cfc8de40748da8c69b2e4e854bd0ba5d410e233c
The hp-ftp trojan pretends to be an exploit created by the Last Stage of Delirium that targets HP-UX FTP servers. Upon executions this file will try to add two new accounts to the password file and will send an email with netstat information to aborted@yahoo.com LinuxPir8@yahoo.com. Archive password is set to p4ssw0rd. Use at your own risk.
323f34db83b7d6108a4f23c73d3afb15
Solaris x86 v2.8 /bin/login via telnet remote buffer overflow exploit. Uses fixed addresses. Executes any command as root.
8d3fd288df4995d5d3f1e2fea300e371c51d0455b03a428ac1c07e3ded29d2ab
Pmake <= 2.1.33 local root exploit. Some distributions have pmake suid root by default.
2b080511384ae8e213adb366947433c6146e524aa2bfafbf50c32312f1454f8f