exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2002-09-11

newtcp.htm
Posted Sep 11, 2002
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Strange Attractors and TCP/IP Sequence Number Analysis - One Year Later. Includes cool 3D pictures of the sequence number distribution for several OS's and analyzes the predictability of each. Many OS's have very predictable sequence numbers, allowing non encrypted connections to be spoofed and enabling protocol attacks against encrypted connections.

tags | paper, spoof, tcp, protocol
SHA-256 | 8386fe49e309794b7189962fc049c48f76491712ae797906588405f871f5b1dc
targets.319
Posted Sep 11, 2002

List of targets for the x2 remote crc32 ssh exploit which contains 319 entries.

tags | exploit, remote
SHA-256 | 9657a708d6b0f73e8ee7e26e1ad5e729c8dfca6130b42cb449d4617cefeddd76
coudrape.c
Posted Sep 11, 2002
Authored by Cloudass

Efstool local root exploit for linux/x86 in C.

tags | exploit, x86, local, root
systems | linux
SHA-256 | 206195523043f6b384519ce939b2bf375c728b46e03b79ab11f2681c9fcb2a5c
efstool.pl
Posted Sep 11, 2002
Authored by user_15335@erato.uk.clara.net

Efstool local root exploit for linux/x86 in perl.

tags | exploit, x86, local, root, perl
systems | linux
SHA-256 | 0c20993f175a32aca30aedfa32968fd459cca1b2388fea27e1bb2440ec83fb14
autolinuxconf.tgz
Posted Sep 11, 2002
Authored by Syscalls | Site myseq.com

Autolinuxconf.tgz is an improved exploit for linuxconf <= 1.28r3 which has been found to work on Mandrake 8.1 and 8.2 and Redhat 7.2 and 7.3.

tags | exploit
systems | linux, redhat, mandrake
SHA-256 | 3d5644a86004378365d91810e8826011af33787751064d3f5d6d4b4957895086
prelude-manager-0.8.5.tar.gz
Posted Sep 11, 2002
Site prelude.sourceforge.net

Prelude Manager is the main program of the Prelude Hybrid IDS suite. It is able to register local or remote sensors, let the operator configure them remotely, receive alerts, and store alerts in a database or any format supported by reporting plugins, thus providing centralized logging and analysis.

Changes: Fixed a heartbeat insertion problem.
tags | tool, remote, local, intrusion detection
systems | unix
SHA-256 | cc25fccf7ed25fb375d00c621b6dfee54ded352cf253b9b4d100b1279c27857a
aimsniff-0.4.tar.gz
Posted Sep 11, 2002
Site sourceforge.net

AIM Sniff is a utility for monitoring and archiving AOL Instant Messenger messages across a network which has the ability to do a live dump (actively sniff the network) or read a PCAP file and parse the file for IM messages. You also have the option of dumping the information to a MySQL database or STDOUT. AIM Sniff will also monitor for an AIM login and then perform an SMB lookup on the originating computer in order to match NT Domain names with AIM login names (handles). A basic Web frontend is included.

Changes: Better parsing of messages. A Web front end was added to monitor what AIM Sniff has seen. Now uses SMB to look up the NT username of the user's originating IP address. New switches were added, and can be listed with the "-h" switch.
tags | tool, web, sniffer
SHA-256 | fd649823363757c82b5a0fff04c84f5b2c112b3e7b0a3c692e02409f8ec7bb8c
floppyfw-2.0.2.img
Posted Sep 11, 2002
Authored by Thomas Lundquist | Site zelow.no

Floppyfw is a router and firewall on one floppy disk. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy.

Changes: A minor glitch in which the /tmp directory was omitted has been fixed.
tags | tool, firewall
systems | linux
SHA-256 | fb2c25356c64581dcd34bf0330690d86d130e07dadca2567b0f7035adde7445a
linux-2.2.21-ow2.tar.gz
Posted Sep 11, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Added many security fixes for issues with the Linux kernel.
tags | overflow, kernel
systems | linux
SHA-256 | 2fa57b89ffa2eef96ee4b1b9421edd13132dc79a66c380fdf318c75b0f15be97
woltlab.txt
Posted Sep 11, 2002
Authored by Cano2

Woltlab Burning Board 2.0 RC 1 has a vulnerability that allows any user (even guests, depending on the configuration) to compromise every other account due to a variable containing unchecked user input in board.php, which can be used for a sql injection attack.

tags | exploit, php, sql injection
SHA-256 | c4137ea31f5a97b9986a26c210deb1ab9aecbe8674896eed48684916a74e6911
gm010-ie
Posted Sep 11, 2002
Site sec.greymagic.com

GreyMagic Security Advisory GM#010-IE - Microsoft Internet Explorer 5.5 and above are vulnerable to an attacker who can execute scripts on any page that contains frame or iframe elements, ignoring any protocol or domain restriction set forth by Internet Explorer. This means that an attacker can steal cookies from almost any site, access and change content in sites and in most cases also read local files and execute arbitrary programs on the client's machine. Note that any other application that uses Internet Explorer's engine is also affected.

tags | arbitrary, local, protocol
SHA-256 | 536c623ed699440d80879e2d1a445648296439d9070e173e9d6be71b37dbd554
FS-091002-SVWS
Posted Sep 11, 2002
Authored by Robin Keir | Site foundstone.com

Foundstone Security Advisory FS-091002-SVWS - A buffer overflow exists in versions 3.1 and previous of Savant Web Server. Exploitation of this vulnerability allows remote execution of arbitrary code with daemon privileges. Sending a GET request containing a URL of approximately 291 characters or more causes Savant Web Server to crash. Exploitation is possible and proof of concept code has been authored to demonstrate this problem.

tags | remote, web, overflow, arbitrary, proof of concept
SHA-256 | 70f37fc074e30ee6045d809d83b646df568badcf9e022b3ef37bb31966b9d22c
TRU64_xkb
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Proof of concept local root exploit for _XKB_CHARSET on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.

tags | exploit, local, root, proof of concept
SHA-256 | 5f83eff08541bbc06fd66621a3a8dc5e3bab1aa1f8c417d7114d08e32493538c
TRU64_su
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Another version of the proof of concept local root exploit for su on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.

tags | exploit, local, root, proof of concept
SHA-256 | 9cbde5adc2c81de3403d966382aec854bb89b7bfedf67e4414df048b1072d855
TRU64_nlspath
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Proof of concept local root exploit written in Perl for NLSPATH overflow on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.

tags | exploit, overflow, local, root, perl, proof of concept
SHA-256 | 043ef35d7a52583cfb9a16cbe7375cfb16fa194e098a890b5062c1d0c158add4
TRU64_dxterm
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Proof of concept local root exploit for dxterm on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.

tags | exploit, local, root, proof of concept
SHA-256 | 7641ec331e72b6fb06dc3453fc283a2e31df40eb6a293e3309e2973d2f2ec9ef
TRU64_dtterm
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Proof of concept local root exploit for dtterm on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.

tags | exploit, local, root, proof of concept
SHA-256 | 5c56428a6139e61c99fa9f5db38817d0a4074cdaf381ec8b3ef44b14464d3989
TRU64_dtprintinfo
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Proof of concept local root exploit for dtprintinfo on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.

tags | exploit, local, root, proof of concept
SHA-256 | 2f36210e049f1209dde685ccd1b054b6d378f47845a4760100069c2300d62469
TRU64_dtaction
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Proof of concept local root exploit for dtaction on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.

tags | exploit, local, root, proof of concept
SHA-256 | 0355e77beeade3d3d076c7f0a7af6bb069165b7af7d5d2bd65ee0a58f1ea3149
TRU64_advisory.txt
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Strategic Reconnaissance Team Security Advisory - The Tru64 operating system produced by HP/Compaq contains multiple buffer overflows in multiple system libraries and binaries. Tru64 is now shipped with its non-exec stack implementation enabled by default. This measure is intended to mitigate the risk presented by buffer overflow conditions in setuid binaries - However, it has been proven to be ineffective in preventing an attacker gaining increased privileges through traditional avenues of exploitation.

tags | overflow
SHA-256 | dd37ab957d77b03acf3db538c0909187267cdbbe7b785d465d561374ea3cb0cb
Atstake Security Advisory 02-09-10.1
Posted Sep 11, 2002
Authored by Atstake | Site atstake.com

Atstake Security Advisory A091002-1 - Apple QuickTime ActiveX v5.0.2 has a buffer overrun conditions that can result in execution of arbitrary code. To exploit this vulnerability an attacker would need to get his or her target to open a malicious HTML file as an attachment to an email message, as a file on the local or network file system, or as a file via HTTP.

tags | web, overflow, arbitrary, local, activex
systems | apple
SHA-256 | 67fa04ee26e8153f5ebac2a4e8afbc94afbd217f0c2391f6d6bcc01b0c137578
mielietools-v1.0.tgz
Posted Sep 11, 2002
Authored by Roelof Temmingh | Site sensepost.com

MielieTool v.1.0 is an easy to use Perl based web application "fuzzer". It supports fuzzing of CGIs in forms and links and supports multiple sites. Requires HTTrack, Lynx, grep, find, and rm.

tags | tool, web, cgi, perl, fuzzer
systems | unix
SHA-256 | efe615a070bb52a86f4508d814701ed4d6a3c1ea75ca01531f7e8a5ad1cf4e47
pjam2.exe
Posted Sep 11, 2002
Authored by Cys

Pjam2 is an effective UDP packet flooder for windows.

tags | denial of service, udp
systems | windows
SHA-256 | 5971d4cc242e5751965f84ce45e4c3a35d3e01fea0016480e7fcde4fea94f5e6
phpcrlf.txt
Posted Sep 11, 2002
Authored by Ulf Harnhammar

fopen(), file() and other functions in PHP have a vulnerability that makes it possible to add extra HTTP headers to HTTP queries. Attackers may use it to escape certain restrictions, like what host to access on a web server. In some cases, this vulnerability even opens up for arbitrary net connections, turning some PHP scripts into proxies and open mail relays.

tags | exploit, web, arbitrary, php
SHA-256 | 5290e8e6790626ca08c64a22a15bf3eaf5ff02cbf45a8623f2fd9c85f94d348f
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close