exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2002-09-19

Posted Sep 19, 2002
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added devpts fix, fixed is_secret64() to properly hide files, and fixed a memory leak.
systems | linux
MD5 | 156ded13d5e16b84a9e31193bc9bc417
Posted Sep 19, 2002
Authored by teso | Site teso.scene.at

Burneye ELF encryption program, x86-linux binary, version 1.0 - new year release!

tags | x86
systems | linux
MD5 | 13bd499f3695bb087c7742a82471c565
Posted Sep 19, 2002
Authored by teso | Site teso.scene.at

Stripped burneye sources, for educational purposes (beside the speech + article).

MD5 | 14f3aeb7cab6ab215e6c6a3997561408
HexView Security Advisory 2002-09-02.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020902-01-I - SGI IRIX 6.5 systems apply world-readable permissions on all coredumps. This can allow local users to disclose sensitive information from system coredumps. This affects IRIX versions prior to 6.5.15.

tags | local
systems | irix
MD5 | 9315a98001591b774f8fa81e3687ba21
HexView Security Advisory 2002-09-01.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020901-01-A - It has been found that several operating systems have insecurely implemented the IGMP protocol and several attacks can be used to take down network segments that are being routed by such systems. SGI acknowledged the problem but did not release patches yet.

tags | protocol
MD5 | 84dae135b0b8628df90fe803eeda5f2e
Posted Sep 19, 2002
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added XML format to ReportWriter, Updated to CVE Version 20020625, Added 'dig' support for dns checks, Updated smb.sara to handle new rpcclient arguments, Added test for backdoor based on bnc variant, Added test for binshell backdoor, Added test for OpenSSL vulnerabilities, Added test for OpenSSH vulnerabilities, Added tests for PHP vulnerabilities, Added test for Apache pre 2.0.39 (non Unix) exploit, Fixed configure to build rpcgen correctly, Fixed problem with tcpscan.sara, Fixed problem with MS Terminal tutorial, Fixed HTML error in tutorials (problem with MS Word conversion), and enhanced the correction facility in the ReportWriter.
tags | tool, cgi, scanner
systems | unix
MD5 | 2de6904cf7b6c8557023bc565799e11c
Posted Sep 19, 2002
Authored by electronicsouls

Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.

tags | exploit, local, root
systems | cisco, linux
MD5 | a2c3a57714a738b22361ec246558f0da
Posted Sep 19, 2002
Authored by Zillion | Site safemode.org

This exploit abuses a local buffer overflow in the Cisco VPN 5000 Linux client v5.1.5 close_tunnel binary to spawn a root shell.

tags | exploit, overflow, shell, local, root
systems | cisco, linux
MD5 | 7943a0a865858b090e32ef6d43864ca5
Posted Sep 19, 2002
Authored by Tony Bettini | Site foundstone.com

Foundstone Labs Advisory 091802-ISSC - A vulnerability found in the manner used by Internet Scanner to parse certain types of non-standard HTTP responses can result in a remotely exploitable buffer overflow condition. This affects Internet Scanner version 6.2.1 for Windows (NT/2000) and has been corrected with X-Press Update 6.17.

tags | web, overflow
systems | windows
advisories | CVE-2002-1122
MD5 | 06e22daad9aaac55f9dfda00e560e8d3
Posted Sep 19, 2002
Authored by Sacrine | Site netric.org

k3.c is a Linux proof of concept exploit for a buffer overflow vulnerability that exists in the atftp client version 0.5 and 0.6.

tags | exploit, overflow, proof of concept
systems | linux
MD5 | a91745fde8b472e0455ff81b929e63c3
Posted Sep 19, 2002
Authored by Ernesto Tequila | Site MRdownload.de

Personal FTP 4.0 stores all user names and passwords in the program in clear text, making it often possible to download all the users passwords.

MD5 | bbc4ecc750269e5c5e4f48f3495ffe6d
Posted Sep 19, 2002
Authored by Nebunu

Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.

tags | exploit, worm, shell, x86, tcp
systems | linux
MD5 | 6c13247823eb45dd5c16db33f5077072
Posted Sep 19, 2002
Authored by Nebunu

FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.

tags | exploit, worm, shell, tcp
systems | freebsd
MD5 | c951622daa65e39d1df562c2219acecc
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Buffer Overflows for Kids part 2 - This is part two, the follow on from bofs4kids. In this tutorial I am going to attempt to give you the knowledge to be able to e exploit a program, without coding in C. But we will need to use gdb quite a bit, so any prior knowledge would be helpful but not necessary.

tags | overflow
MD5 | 4cfd9785b13c35dc81b71b93e26cb49f
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

This tutorial is not going to teach you how to code an exploit, but what it is going to do is give you a good understanding of what a buffer overflow is, what types of buffer overflows there are, how we would go about exploiting a buffer overflow, and how to identify a buffer overflow. C and ASM knowledge is not required.

tags | overflow
MD5 | 7fbf27ec6573ab0c860055f326755bf1
Posted Sep 19, 2002
Authored by Danny | Site ebcvg.com

Lastlog log editor.

tags | tool, rootkit
systems | unix
MD5 | fa2f559883f9a1106bcd673ec0327caf
Posted Sep 19, 2002
Authored by Danny | Site ebcvg.com

This tutorial was written to show Unix users how to create a simple Unix LogFile editor.

tags | tool, rootkit
systems | unix
MD5 | f85a8922a2199d45ff4e10dbc30bbeca
Page 1 of 1

File Archive:

December 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    22 Files
  • 2
    Dec 2nd
    33 Files
  • 3
    Dec 3rd
    16 Files
  • 4
    Dec 4th
    22 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By