what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2002-01-19

netbsd.2002-001.ptrace
Posted Jan 19, 2002
Site netbsd.org

NetBSD Security Advisory 2002-001 - A vulnerability found in the ptrace implementation on NetBSD 1.5.* , 1.4.* and CURRENT (prior to January 14, 2002) systems can result in race conditions where it is possible to use ptrace and SUID binaries to execute code with elevated privileges.

systems | netbsd
SHA-256 | e2ceb90aa470a1126631cd2c2ce223394cc423f2b65930b3f1227dd7029eb3b2
ishell-v0.1.tar.gz
Posted Jan 19, 2002
Authored by Peter Kieltyka

ICMP Shell is a program written in C for the UNIX environment that allows an administrator to access their computer remotely via ICMP. More info available here.

tags | shell
systems | unix
SHA-256 | f7bc22221aa7d982e7e69a1f1ba7bb267744d00b83ca1902191cba9950fb70ac
chkrootkit-0.35.tar.gz
Posted Jan 19, 2002
Authored by Nelson Murilo | Site chkrootkit.org

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD. Tested on Linux 2.0.x, 2.2.x and 2.4.x (any distribution), FreeBSD 2.2.x, 3.x and 4.x, OpenBSD 2.6, 2.7, 2.8, 2.9 and 3.0, Solaris 2.5.1, 2.6 and 8.0.

Changes: Now includes its own strings command, tests for ldsopreload and lsof, new ports added to the bindshell test, and several new rootkits and trojans added, including the RST.b trojan, duarawkz, knark LKM, HiDrootkit, Monkit, Bobkit, Pizdakit, and t0rn v8.0.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 245625e58aa65c130869fc32a8e8c06888ee940e89fad501cb0ae03bfd778566
mailstation.pl
Posted Jan 19, 2002
Authored by KAN|N, Masskic

Mailstation.pl exploits a DoS condition in the Intel eMail station.

tags | denial of service
SHA-256 | f501f204ec204100cb68bc75ae260cad7caa05999ea63ac831eb65e0e1d8e4bf
sniffit-exp1.txt
Posted Jan 19, 2002
Authored by g463

Sniffit v0.3.7beta remote root buffer overflow exploit. Requires the admin to be running sniffit with the -L option.

tags | exploit, remote, overflow, root
SHA-256 | 59327ddb76c91e3de271d2d39d73f05e157642374a506dd212cb01e7026276c7
FreeBSD Security Advisory 2002.7
Posted Jan 19, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:07 - The k5su command included with FreeBSD, versions prior to 4.5-RELEASE, and the su command included in the heimdal port, versions prior to heimdal-0.4e_2, use the getlogin system call in order to determine whether the currently logged-in user is 'root'. In some circumstances, it is possible for a non-privileged process to have 'root' as the login name returned by getlogin. You don't actually want that to happen, trust us.

tags | root
systems | freebsd
SHA-256 | 53875598a31417450b640a6ead62cd1ba3c1efd31d8d7e05c0c072b13bc5bca6
attn.tar.gz
Posted Jan 19, 2002
Authored by Zen-Parse

Attn.tar.gz is a Redhat 7.0 local root exploit which takes advantage of a bug in the at command which allows an attacker to free() user controlled memory. Tested on Redhat 7.0 with the glibc-2.2.4-18.7.0.3 and at-3.1.8-12 packages installed.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | 68cf6e7dc2b3afc0aa47e66d705351d8b032f2fac0afda3d0b705506d8468181
avirt.42.txt
Posted Jan 19, 2002

The Avirt telnet proxy v4.2 and below has a remotely exploitable buffer overflow. Tested on Win2k. Strumpf Noir Society

tags | overflow
systems | windows
SHA-256 | b95135944e65dc824cd0d38a5ed558adbd0ce830e4673f4169c91b2793ff41bd
steghide-0.4.3.tar.gz
Posted Jan 19, 2002
Site steghide.sourceforge.net

Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. It is able to embed data in BMP, WAV, and AU files.

Changes: Added crc32 checksum support, allows embedding of plainfile name, rewrote some parts.
tags | encryption, steganography
SHA-256 | ff9bc688ec3eb84593723ea25071447f207bcfaa94f53a248ca0096d9e2cc5a5
unichk.tar.gz
Posted Jan 19, 2002
Site tomktech.n3.net

Unichk is a tool for Linux which checks for 224 Unicode vulnerabilities in Microsoft IIS.

tags | exploit, vulnerability
systems | linux
SHA-256 | 45a6db642a8a66e95d9334c8d29873ecda259a67fbb203d5302c66e083806f7e
Page 1 of 1
Back1Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close