what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2002-07-08

Posted Jul 8, 2002
Authored by Frederick Giasson | Site decatomb.com

Memory Layout - Detailed information on memory management.

tags | paper
systems | unix
SHA-256 | cc6fe6e45674468a6bc672789840a5b21125c251e2bdb99011fbff20d436c393
Posted Jul 8, 2002
Authored by shadowpenguin, Shadow Penguin Security | Site shadowpenguin.org

GreedyDog v2.3 is an ethernet packet sniffer for Linux, FreeBSD, OpenBSD, NetBSD, Solaris, IRIX, SunOS4, AIX, MacOSX, and Windows2000/Xp. GreedyDog keeps stream of each TCP session and writes to logfile. Very portable. Manual is here.

tags | tcp
systems | linux, netbsd, solaris, freebsd, irix, openbsd, aix
SHA-256 | 9ea5aa65e79bb73b43231fbad538888ef8b601b0fa200261c300006cf9e23e7c
Posted Jul 8, 2002
Authored by Zillion, Alex Hernandez | Site safemode.org

Slrnpull '-d' buffer overflow exploit. Executes shellcode with group 'news' privileges. Tested to work on an Intel Red Hat 6.2 installation .

tags | exploit, overflow, shellcode
systems | linux, redhat
SHA-256 | eccfcdb6d3ad013958b3649b816be1230bf50ad9509fddc11a59fc1c14880407
Posted Jul 8, 2002
Authored by sd | Site sd.g-art.nl

The SucKIT is easy-to-use, Linux-i386 kernel-based rootkit. The code stays in memory through /dev/kmem trick, without help of LKM support nor System.map or such things. Everything is done on the fly. It can hide PIDs, files, tcp/udp/raw sockets, sniff TTYs. Next, it have integrated TTY shell access (xor+sha1) which can be invoked through any running service on a server. No compiling on target box needed, one binary can work on any of 2.2.x & 2.4.x kernels precompiled (libc-free).

tags | tool, shell, kernel, udp, tcp, rootkit
systems | linux, unix
SHA-256 | 0782e8116250f17749de320363e484ece37a2856ab5f59c96075f788b0c901a8
Posted Jul 8, 2002
Authored by Nebunu

Apache chunked encoding mass scanner / defacer. When a vulnerable server is found code is launched.

tags | tool, scanner
systems | unix
SHA-256 | e701383409bcc76b9426ac970d717b951451d645474790a4db482cd1cf64f15d
Posted Jul 8, 2002
Authored by Bl0wfi5h

Labview v5.1.1 and below denial of service exploit.

tags | denial of service
SHA-256 | 63e49c0eaaa4336a0325f6a46a82472a47c66c33ef37e4f6220653f0c7488c72
Posted Jul 8, 2002
Authored by Gobbles Security | Site bugtraq.org

Remote root exploit for Solaris Sparc 6-8 rpc.walld.

tags | exploit, remote, root
systems | solaris
SHA-256 | c1e410fe5ab1b188ba6d26dea7078a80e8c12c1aca5f21472f6d5a56a4dc4455
Posted Jul 8, 2002
Authored by Nebunu

Microsoft IIS 4/5.0 remote .ida exploit. Spawns a shell on port 8008.

tags | exploit, remote, shell
SHA-256 | 0fd5e0fbd77aa95dad4b9cbea18e4904d8c929ac25376f72fd816415bf8d97d3
Posted Jul 8, 2002
Authored by Bob, dsr | Site dtors.net

Backdoors Bash-2.05 for local root.

tags | tool, local, root, rootkit, bash
systems | unix
SHA-256 | a091c406eec0646458840e3613e28a2adfa1c29709189adf1882c67b9ae23876
Posted Jul 8, 2002
Authored by Bob, dsr | Site dtors.net

Apache remote DoS (1.3.x/2.0.x branches) based on the recent flaw met in chunked encoding.

tags | exploit, remote
SHA-256 | cec28b70971878ff54768796e2494d2f8f48cedd275ac84b1261c0bfa5ecdbd3
Posted Jul 8, 2002
Authored by Byterage | Site byterage.cjb.net

Burndump is a LKM which strips off the Teso burneye protection from encrypted executables. You must be able to run the executable. When the program is unwrapped you don't need the host-fingerprint or the password anymore and the ELF file can be reverse engineered without the burneye anti-debugger tricks. Tested under Linux v2.4.x.

systems | linux, unix
SHA-256 | 3b36a23bff328ef64a1ac8f9706fb52054711b53b98732f854931af64e878115
Posted Jul 8, 2002
Authored by Adam Slattery

Kcms_configure -o -S command line local root buffer overflow for SPARC/solaris 8. More information available here.

tags | exploit, overflow, local, root
systems | solaris
SHA-256 | 78bc78b679916c2da141474802dd02ab271715c5e4e3edc5e7bc694f77031ccc
Posted Jul 8, 2002
Authored by Victor Lima | Site violating.us

Bigeye is a network utility dump that can be run in multiple modes - sniffer, logging connections, and even emulating protocols such as HTTP or FTP. The main focus of this program is to create an emulative service that would fool hackers/worms into thinking that they're exploiting a real service, but in fact, they're trying to exploit a fake service. The services currently available are ftp or http. Useful for honeypots.

tags | worm, web, system logging, protocol
systems | unix
SHA-256 | 539835fe1b31923f09bb295a5f862a421092758644cc95c5c8832c043cfe9635
Posted Jul 8, 2002
Authored by Arnaud Jacques | Site securiteinfo.com

The KF Web Server v1.0.2 shows file and directory content if %00 is appended to the URL. Patch available here.

tags | exploit, web
SHA-256 | 57f627a9f7b88cd3cc183123645d6f6df32860f6e50530dad88c452563699256
Posted Jul 8, 2002
Site neoerudition.net

How to hack windows remotely through file sharing.

tags | paper
systems | windows
SHA-256 | ffc2b445833e871c315c998250f6bb60702c9aff78e05256d53c79e26ad64a71
Posted Jul 8, 2002
Authored by Cedric Blancher | Site arp-sk.org

An ARP Man In the Middle tool for Windows, which allows one to redirect traffic on a LAN. See http://www.arp-sk.org/ for further information.

tags | web
systems | windows
SHA-256 | 7c83e529e9d258e4315f98745f67f5fb87f6070e2e6805589e7fa8950669f767
Posted Jul 8, 2002
Authored by Cedric Blancher | Site arp-sk.org

An ARP packet generator for Windows designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning. See http://www.arp-sk.org/ for further information.

tags | web, protocol
systems | windows
SHA-256 | f1191f75f28f7a68d09d4241dd2bf20d460669b7d2b6eea6f0ef3687a36b6ce6
Posted Jul 8, 2002
Authored by Cedric Blancher | Site arp-sk.org

An ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning. See http://www.arp-sk.org/ for further information.

tags | web, protocol
systems | unix
SHA-256 | 21428b13238919ff843b6c227cdda0412bd27c97f46fd1a37cea460b5aa9a56c
Posted Jul 8, 2002
Authored by Net Creature | Site proxychains.sourceforge.net

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

tags | web, tcp
systems | linux, unix, solaris
SHA-256 | 2a96c33a0a19de6d914800a19780c4cf0afe15ce07d6b285cce8f622ff3aa7da
Posted Jul 8, 2002
Authored by Butternuts

Fake Backdoor System v1.1 - Binds to a port and waits for a connection. When attacker runs a command known to the backdoor, it will print a cloned response back to trick the user, and then disconnect the user from the host. Will save to a log file of choice (default is fbdlog.txt) which includes the Hostname and Command used by the attacker.

tags | tool, rootkit
systems | unix
SHA-256 | 5dc3ae887a9df138c0d781f450a5e1ee7cb64aa46e88bf2b62f2a6836f40913b
Posted Jul 8, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Logs of new functions are available! Several bugs were fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | aaccde9036a29ac77918fe1c8fdc2677865d02d67615a6a300462690f1da8911
Posted Jul 8, 2002
Authored by Soap | Site securityfriday.com

IE'en remotely controls Internet Explorer using DCOM. Windows username and password required. This tool can capture data sent and received using Internet Explorer and more.

tags | exploit
systems | windows
SHA-256 | 9ef911b4b08a0221e78596c8ed1e45ef18ad4ebfd6e83362e9bc571939b71cad
Posted Jul 8, 2002
Authored by Crazy Einstein

2fax prior to v2.02 for Linux and Windows contains a locally exploitable buffer overflow.

tags | overflow
systems | linux, windows
SHA-256 | 14214e7f949c470b58c600c51e76ebc4d256a68496c77854fa8efd95dc259861
Posted Jul 8, 2002
Authored by crazy_einstein@yahoo.com | Site lbyte.void.ru

2fax -bpcx option local exploit for Linux.

tags | exploit, local
systems | linux
SHA-256 | ebae72f5d4e6a1ffe3acb022e81f8c0f51e05a3a4c47eaa2b903e3d2c92066ef
Page 1 of 1

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By