exploit the possibilities
Showing 1 - 14 of 14 RSS Feed

Files Date: 2002-02-12

Posted Feb 12, 2002
Site cert.org

CERT Advisory CA-2002-03 - Multiple vulnerabilities have been discovered in various Simple Network Management Protocol (SNMP) implementations. These vulnerabilities may allow unauthorized privileged access, denial-of-service attacks, or cause unstable behavior. It is urged that administrators turn off SNMP altogether if it is not currently necessary. Research and discovery made by the University of OULU.

tags | vulnerability, protocol
MD5 | 39a786620e344c73c71845fa9739eb9d
Posted Feb 12, 2002
Authored by chaozkid

FTP-Bruteforcer is a quick perl program to brute force FTP accounts. You can switch off ping, it loggs each password even when the session is aborted, it creates automatically a log in your $HOME. It also has a status report on tty8, which shows you the user-pass combination the script checks.

tags | cracker, perl
MD5 | 2e19925ef71ca512f92092b68d22f1a2
Posted Feb 12, 2002

SilentLog is a keystroke logging tool that runs under several Windows 32 versions (it should also run under NT). The best of it's features is it's small size: only 7 KB compiled. (But it's NOT a DOS program, it uses 32Bit-Windows). The source code (FASM assembly syntax) is included. The executable also contains a DLL which it recreates when loaded. (So the real sizes are 3 KByte executable and 4 KByte for the DLL). The program logs all standard keys (the return key is also processed correctly). See Readme.txt included.

systems | windows
MD5 | 7626973501e3f345e04beae4a70ee4f3
Posted Feb 12, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Morpheus request share files denial of service exploit.

tags | exploit, denial of service
MD5 | 2d295b1b718f4fbfafbb1b8da9b467f7
Posted Feb 12, 2002
Authored by Mayhem | Site devhell.org

LKH is a very powerful and documented kernel function hooking library running on Linux 2.4/x86 . The code has been explained and the API described in Phrack #58 : Linux x86 kernel function hooking emulation. It Supports functions with or without frame pointer, you can enable, disable the hook, access in rw mode the original function parameters, set as permanent or singleshot hijacking, and be discrete or aggressive.

Changes: Now available for kernels 2.4.6, 2.4.7, 2.4.8, and 2.4.10.
tags | x86, kernel
systems | linux, unix
MD5 | 4652d9348f6f2a04e10aaba727436bef
Posted Feb 12, 2002

Microsoft Security Advisory MS02-004 - The Windows 2000 telnet server contains an unchecked buffer which allows remote code execution. Interix 2.2 is also affected. Microsoft FAQ on this issue available here.

tags | remote, code execution
systems | windows, 2k
MD5 | 7c752767d0fd178553495f5ab9a997e9
Posted Feb 12, 2002

Microsoft Security Advisory MS02-003 - A flaw in Microsoft Exchange 2000 allows remote users to remotely access configuration information on the server. Specifically, this flaw inappropriately gives the "Everyone" group privileges to the WinReg key. This key controls the ability of users and groups to remotely connect to the Registry. Microsoft FAQ on this issue available here.

tags | remote, registry
MD5 | de88f287e426045d6ef3f108bfdc940f
Posted Feb 12, 2002

Microsoft Security Advisory MS02-002 - Malformed Network Request can cause Office v. X for Mac to Fail. Office v. X contains a network-aware anti-piracy mechanism creates a denial of service vulnerability. An attacker could use this vulnerability to cause other users' Office applications to fail, with the loss of any unsaved data. An attacker could craft and send a special packet to a victim's machine directly, by using the machine's IP address. Or, he could send this same directive to a broadcast and multicast domain and attack all affected machines. Microsoft FAQ on this issue available here.

tags | denial of service
MD5 | 103682c9a8a7cd43dae94e9daad943b0
Posted Feb 12, 2002
Authored by James Martin | Site uuuppz.com

Proof of concept exploit for the buffer overflow vulnerability that exists in the nick handling code of mIRC. This exploit works with mIRC version 5.91 which is the latest version that is affected by this vulnerability.

tags | exploit, overflow, proof of concept
MD5 | 24ac961a3373f30a0eaaf130480bd8af
Posted Feb 12, 2002
Authored by James Martin | Site uuuppz.com

mIRC v5.91 and below has an exploitable bug which allows remote code execution. mIRC assumes the current nickname of the client as sent by the server is fewer than 100 characters long. mIRC stores the current and alternative nickname as a static array. Sending a nickname over 200 characters long allows overwriting of a key variable, the index to the current nickname. Fix available here.

tags | remote, code execution
MD5 | 220ff5c84194f4e99ad9decf00d4e724
Posted Feb 12, 2002
Authored by Paul Starzetz | Site appcap.ihaquer.com

Appcap is an application for x86 Linux which allows root on a machine to attach and redirect standard input and output of any application to his actual tty. Appcap can help admins running a multiuser machine to snoop on users. It is especially very useful for tracing and monitoring ssh and telnet sessions.

tags | x86, root
systems | linux
MD5 | 57e5a96a36f90b00238f3757fa3e557b
Posted Feb 12, 2002
Authored by Zillion | Site safemode.org

FreeBSD/Linux exploit for a buffer overflow in the snes9x Nintendo emulator. The linux shellcode works also on FreeBSD since snes9x runs on those systems with linux emulation.

tags | exploit, overflow, shellcode
systems | linux, freebsd
MD5 | ee8cdfcecd1260803c8ee253d0ae841f
Posted Feb 12, 2002
Authored by Zillion

Linux x86 shellcode that does an execve of /bin/sh. This shellcode contains no slashes so it can bypass certain application filters and was originally written for a snes9x buffer overflow.

tags | overflow, x86, shellcode
systems | linux
MD5 | 659b82a01b0065d6f401ecd5b04648a7
Posted Feb 12, 2002
Authored by NTFX | Site legion2000.uni.cc

Cw.c is a udp flooder which does not need root, based off udp-bitchslap.c.

tags | denial of service, root, udp
MD5 | 79f95209309e25f0e1e2f90f6cd7914a
Page 1 of 1

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    10 Files
  • 23
    Apr 23rd
    22 Files
  • 24
    Apr 24th
    7 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By