exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2002-09-19

adore-0.42.tgz
Posted Sep 19, 2002
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added devpts fix, fixed is_secret64() to properly hide files, and fixed a memory leak.
systems | linux
MD5 | 156ded13d5e16b84a9e31193bc9bc417
burneye-1.0-linux-static.tar.gz
Posted Sep 19, 2002
Authored by teso | Site teso.scene.at

Burneye ELF encryption program, x86-linux binary, version 1.0 - new year release!

tags | x86
systems | linux
MD5 | 13bd499f3695bb087c7742a82471c565
burneye-stripped.tar.gz
Posted Sep 19, 2002
Authored by teso | Site teso.scene.at

Stripped burneye sources, for educational purposes (beside the speech + article).

MD5 | 14f3aeb7cab6ab215e6c6a3997561408
HexView Security Advisory 2002-09-02.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020902-01-I - SGI IRIX 6.5 systems apply world-readable permissions on all coredumps. This can allow local users to disclose sensitive information from system coredumps. This affects IRIX versions prior to 6.5.15.

tags | local
systems | irix
MD5 | 9315a98001591b774f8fa81e3687ba21
HexView Security Advisory 2002-09-01.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020901-01-A - It has been found that several operating systems have insecurely implemented the IGMP protocol and several attacks can be used to take down network segments that are being routed by such systems. SGI acknowledged the problem but did not release patches yet.

tags | protocol
MD5 | 84dae135b0b8628df90fe803eeda5f2e
sara-4.0.1.tgz
Posted Sep 19, 2002
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added XML format to ReportWriter, Updated to CVE Version 20020625, Added 'dig' support for dns checks, Updated smb.sara to handle new rpcclient arguments, Added test for backdoor based on bnc variant, Added test for binshell backdoor, Added test for OpenSSL vulnerabilities, Added test for OpenSSH vulnerabilities, Added tests for PHP vulnerabilities, Added test for Apache pre 2.0.39 (non Unix) exploit, Fixed configure to build rpcgen correctly, Fixed problem with tcpscan.sara, Fixed problem with MS Terminal tutorial, Fixed HTML error in tutorials (problem with MS Word conversion), and enhanced the correction facility in the ReportWriter.
tags | tool, cgi, scanner
systems | unix
MD5 | 2de6904cf7b6c8557023bc565799e11c
ES-cisco-vpn.c
Posted Sep 19, 2002
Authored by electronicsouls

Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.

tags | exploit, local, root
systems | cisco, linux
MD5 | a2c3a57714a738b22361ec246558f0da
cisco-vpn-5000-lnx.c
Posted Sep 19, 2002
Authored by Zillion | Site safemode.org

This exploit abuses a local buffer overflow in the Cisco VPN 5000 Linux client v5.1.5 close_tunnel binary to spawn a root shell.

tags | exploit, overflow, shell, local, root
systems | cisco, linux
MD5 | 7943a0a865858b090e32ef6d43864ca5
091802-ISSC
Posted Sep 19, 2002
Authored by Tony Bettini | Site foundstone.com

Foundstone Labs Advisory 091802-ISSC - A vulnerability found in the manner used by Internet Scanner to parse certain types of non-standard HTTP responses can result in a remotely exploitable buffer overflow condition. This affects Internet Scanner version 6.2.1 for Windows (NT/2000) and has been corrected with X-Press Update 6.17.

tags | web, overflow
systems | windows
advisories | CVE-2002-1122
MD5 | 06e22daad9aaac55f9dfda00e560e8d3
k3.c
Posted Sep 19, 2002
Authored by Sacrine | Site netric.org

k3.c is a Linux proof of concept exploit for a buffer overflow vulnerability that exists in the atftp client version 0.5 and 0.6.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | a91745fde8b472e0455ff81b929e63c3
personal_ftp.txt
Posted Sep 19, 2002
Authored by Ernesto Tequila | Site MRdownload.de

Personal FTP 4.0 stores all user names and passwords in the program in clear text, making it often possible to download all the users passwords.

MD5 | bbc4ecc750269e5c5e4f48f3495ffe6d
apache-linux.txt
Posted Sep 19, 2002
Authored by Nebunu

Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.

tags | exploit, worm, shell, x86, tcp
systems | linux
MD5 | 6c13247823eb45dd5c16db33f5077072
free-apache.txt
Posted Sep 19, 2002
Authored by Nebunu

FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.

tags | exploit, worm, shell, tcp
systems | freebsd
MD5 | c951622daa65e39d1df562c2219acecc
bof4kids2.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Buffer Overflows for Kids part 2 - This is part two, the follow on from bofs4kids. In this tutorial I am going to attempt to give you the knowledge to be able to e exploit a program, without coding in C. But we will need to use gdb quite a bit, so any prior knowledge would be helpful but not necessary.

tags | overflow
MD5 | 4cfd9785b13c35dc81b71b93e26cb49f
bofs4kids.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

This tutorial is not going to teach you how to code an exploit, but what it is going to do is give you a good understanding of what a buffer overflow is, what types of buffer overflows there are, how we would go about exploiting a buffer overflow, and how to identify a buffer overflow. C and ASM knowledge is not required.

tags | overflow
MD5 | 7fbf27ec6573ab0c860055f326755bf1
lastloge.c
Posted Sep 19, 2002
Authored by Danny | Site ebcvg.com

Lastlog log editor.

tags | tool, rootkit
systems | unix
MD5 | fa2f559883f9a1106bcd673ec0327caf
lastlog.txt
Posted Sep 19, 2002
Authored by Danny | Site ebcvg.com

This tutorial was written to show Unix users how to create a simple Unix LogFile editor.

tags | tool, rootkit
systems | unix
MD5 | f85a8922a2199d45ff4e10dbc30bbeca
Page 1 of 1
Back1Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close