accept no compromises
Showing 1 - 15 of 15 RSS Feed

Files Date: 2002-09-06

msnmsgpwd.exe.zip
Posted Sep 6, 2002
Authored by Obscure | Site perl.ob5cure.com

Windows ActivePerl executable which proves the encryption being used by MSN Messenger v4.6 is weak by doing a base64 decode of a registry key.

tags | cracker, registry
systems | windows
MD5 | 146fc1ab9e738b909ff22f7c3ed738fa
msnmsgpasswd.zip
Posted Sep 6, 2002
Authored by Obscure | Site perl.ob5cure.com

Windows ActivePerl source to a script which proves the encryption being used by MSN Messenger v4.6 is weak. Does a base64 decode of a registry key.

tags | cracker, registry
systems | windows
MD5 | 42b9daa8b7e9312a70b74b6d9cbaf8d4
SQLTools Auditing Collection
Posted Sep 6, 2002
Authored by Refdom

SQLTools is a collection of tools for auditing MSSQL servers including SQLScanner,SQLPing, SQLCracker, SQLDOSStorm, and SQLOverflowDos. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, overflow
MD5 | 91f91176abaa9d208afc9273fe2382f6
shellcode.tgz
Posted Sep 6, 2002
Authored by Claes M. Nyberg | Site cmn.listprojects.darklab.org

Shellcode.tgz contains five Solaris SPARC shellcodes, six FreeBSD shellcodes, and five Linux shellcodes.

tags | shellcode
systems | linux, solaris, freebsd
MD5 | e7c0c04c494f3420127975a1196cd197
upb.admin.txt
Posted Sep 6, 2002
Authored by Hipik | Site hackeri.org

Ultimate PHP Board (UPB) prior to Public Beta v1.0b allows users to gain admin access. Exploit information included.

tags | exploit, php
MD5 | b062b12a3b4fcbc8784d6ef88b87722a
bsd-sh.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

BSD x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.

tags | x86, shellcode
systems | bsd
MD5 | e5f676c96a4469e6f6d0dba0777ccfe2
bsd-bind-sc.c
Posted Sep 6, 2002
Authored by R00T-dude, netric | Site netric.org

150 byte BSD shellcode that binds /bin/sh to tcp port 30464.

tags | tcp, shellcode
systems | bsd
MD5 | 678b618f452496978de5edc3b9e4355f
execve.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

Linux x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.

tags | x86, shellcode
systems | linux
MD5 | c17287a0043ab0d0a776b49c579ebc4a
bind-sc.c
Posted Sep 6, 2002
Authored by R00T-dude, netric | Site netric.org

156 byte linux shellcode which binds /bin/sh to tcp port 30464.

tags | tcp, shellcode
systems | linux
MD5 | dd54707d37453a538dfd24a3e6bc588b
afd-expl.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

AFD v1.2.14 local root heap overflow exploit. Includes offset for Redhat 7.3 and instructions for finding offsets.

tags | exploit, overflow, local, root
systems | linux, redhat
MD5 | f273a2abf33bbe40cc716f3cc0cc09a5
netric-adv008.txt
Posted Sep 6, 2002
Authored by netric, Sacrine | Site netric.org

AFD v1.2.14 and below contains locally exploitable stack and heap overflows. Linux is verified to be vulnerable, other platforms are probably affected.

tags | overflow
systems | linux
MD5 | 93f4d1973aa5a3afaca610ebbacac24a
Phantasmagoria.tgz
Posted Sep 6, 2002
Authored by Dark Angel

Phantasmagoria hides tasks without modifying syscalls in Linux kernel v2.4. Includes a paper "Smashing The Kernel For Fun And Profit" and proof of concept code.

tags | tool, kernel, rootkit, proof of concept
systems | linux, unix
MD5 | a278f9b3307f3c37c9c9d1247f110575
ms02-050
Posted Sep 6, 2002
Site microsoft.com

Microsoft Security Advisory MS02-050 - Microsoft Windows, Microsoft Office for Mac, Microsoft Internet Explorer for Mac, and Microsoft Outlook Express for Mac is vulnerable to certificate identity spoofing because the CryptoAPI does not check Basic Constraints field.

tags | spoof
systems | windows
MD5 | 296ac507ca4e43db209a0e2de7eb55f9
local0.c
Posted Sep 6, 2002
Authored by Slacko

Local0.c is a simple linux lkm that denies root access to remote users only. Tested on Redhat 7.2.

tags | remote, root
systems | linux, redhat
MD5 | bc6350bf2a2af93eb541b9946dfcb2f2
FS-090502-PCRO
Posted Sep 6, 2002
Authored by Tony Bettini | Site foundstone.com

Foundstone Labs Advisory 090502-PCRO - A remotely exploitable buffer overflow has been found in PGP Corporate Desktop 7.1.1 for Windows 2000 and XP which allows remote code execution and sometimes allows the attacker to find the passphrase of the target user. PGP crashes immediately after the decryption of the malicious file and before the memory containing the passphrase is overwritten. Fix available here.

tags | remote, overflow, code execution
systems | windows, 2k
MD5 | b6217d072c5286376437f519b4e2c972
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close