exploit the possibilities
Showing 1 - 25 of 243 RSS Feed

Files Date: 2002-09-01 to 2002-09-30

Posted Sep 29, 2002
Authored by Sec | Site drugphish.ch

Research on the recent OpenBSD select() bug and its possible exploitation. Includes a local denial of service exploit which was tested on OpenBSD v2.6 - 3.1.

tags | exploit, denial of service, local
systems | openbsd
MD5 | 11b34ff9c52e9241262598028265afec
Posted Sep 29, 2002
Authored by Cyrax

Fuck'it RootKit. Uses a ssh daemon which listens on port 1984 by defaut.

tags | tool, rootkit
systems | unix
MD5 | f3d55d07c747e7bb9c69a3a614a9d8d0
Posted Sep 28, 2002

This is a modified version of the Slapper worm and was recovered from a compromised machine. Modifications to the worm let it mail system information, such as the ip address and processor type, to a Yahoo! email address. No other changes where made.

tags | worm
systems | unix
MD5 | c2ef7909789751390183321abdf732ff
Posted Sep 28, 2002
Authored by Guile Cool, eXedes

This tool can be used to replace netstat in order to hide network sockets on a system.

tags | tool, rootkit
systems | unix
MD5 | 906dafcb2634d5b7dae47def6bf3a1d4
Posted Sep 28, 2002
Authored by Vacuum | Site winfingerprint.sourceforge.net

Winfingerprint v0.5.3: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQLSERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, E numerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes.

Changes: Fixed "Long IP problems", you can now specify different port ranges for both TCP and UDP scans, code migrated from VC++6.0 to VC++ .NET, timeouts for TCP/UDP/ICMP scans can now be set manually, "Network Neighborhood" scan was added and many functions where updated.
tags | remote, registry
systems | windows, 9x
MD5 | d96f703cb090acc2bc7b389ff940b268
Posted Sep 28, 2002
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
MD5 | 2c57ce2b3459fb82e0ea4ac83ddece1a
Posted Sep 27, 2002
Authored by Dave Aitel | Site immunitysec.com

SPIKE proxy is a web application analysis tool which uses the SPIKE API to help reverse engineer new and unknown network protocols. Provides security analysis features for Web applications, a multi-threaded design, man in the middle SSL proxying, form rewriting, SQL injection detection, handles Connection: keep-alive properly (it is possible to log in to Hotmail with it), and rewrites User-Agent to pretend to be running IE. Requires pyOpenSSL pre 0.5 from the SPIKE Web page. Several working examples are included. Screenshot available here.

Changes: Core engine fixed, crawling support fixed, directory and file scan added.
tags | web, protocol, sql injection
MD5 | 77fe8f73662ee35c16a20c836a330f3f
Posted Sep 27, 2002
Authored by Dave Aitel | Site immunitysec.com

HashDB is a networked md5 hash comparison tool that allows you to automatically check the hashes of any files you download against a master database stored at www.immunitysec.com. This allows you to download source tarballs without worrying that they've been replaced by trojaned ./configure files.

tags | trojan
systems | unix
MD5 | 6bac6b8504e5a8d7f6976c1a46d4f55a
Posted Sep 27, 2002
Authored by Sunnis | Site ii-labs.tk

Genshell is a fully generic win32 shellcode generator. It compiles on both Linux and Windows. Shellcode is also polymorphic (you can specify xor-byte value). A complete article with source code is included.

tags | shellcode
systems | linux, windows, 32
MD5 | 53ccec49477cd01569c7dcead47f5c08
Apple Security Advisory 2002-09-19
Posted Sep 26, 2002
Authored by Apple | Site apple.com

Apple security advisory APPLE-SA-2002-09-19 - Apple QuickTime ActiveX v5.0.2 has a buffer overrun conditions that can result in execution of arbitrary code. To exploit this vulnerability an attacker would need to get his or her target to open a malicious HTML file as an attachment to an email message, as a file on the local or network file system, or as a file via HTTP.

tags | web, overflow, arbitrary, local, activex
systems | apple
MD5 | 2793d88705d2413a64e7b686a3d3e81c
Posted Sep 26, 2002
Authored by grazer | Site i-security.nl

This exploit uses a symbolic link vulnerability in the Borland Interbase gds_lock_mgr binary to overwrite /etc/xinetd.d/xinetdbd with code that spawns a root shell on port 666 TCP.

tags | exploit, shell, root, tcp
MD5 | 0ecb679470d57b48ec01e63e5ca67c13
Posted Sep 26, 2002
Site gentoo.org

Gentoo Linux security advisory - A vulnerability found in default Apache Tomcat 4.x installation can be used to remotely disclose the source of served JSP files.

systems | linux, gentoo
MD5 | 8b03911058dd82f18aceb37404b596c7
Posted Sep 26, 2002
Site microsoft.com

Microsoft Security Advisory MS02-053 - Serious vulnerabilities have been discovered in Microsoft FrontPage Server Extensions 2000 and 2002 in the SmartHTML Interpreter (shtml.dll). FrontPage Server Extensions 2002 the flaw allows remote attackers to run code of his choice; on FrontPage Server Extensions 2000 the attacker can consume most or all available CPU until the service is restarted.

tags | remote, vulnerability
MD5 | d5d00816519f336d45053863f6c49482
Posted Sep 25, 2002
Authored by Andy

This exploit abuses the KEY_ARG buffer overflow that exists in SSL enabled Apache web servers that are compiled with OpenSSL versions prior to 0.9.6e. The apache-ssl-bug.c exploit is based on the Slapper worm (bugtraq.c), which is based on a early version of the apache-open-ssl exploit.

tags | exploit, worm, web, overflow
MD5 | 1be047c32ae0e2d1d8930d2ce4c4f7cc
Posted Sep 25, 2002
Authored by Rammstein

This tool can be used to scan IIS servers for the unicode directory traversal vulnerability.

tags | cgi
systems | unix
MD5 | 9992afec563d973be3af36bcfa97c9f1
Posted Sep 25, 2002

How to unlock a Samsung T300 cellphone

tags | telephony
MD5 | 84ce827766ef65737d494e25fe3689f2
Posted Sep 25, 2002
Site airsnort.shmoo.com

Airsnort is a tool for wireless lans which recovers encryption keys by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Works on both 40 and 128 bit encryption. Many weaknesses in the WEP 802.11 protocol are discussed here. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second. Tested on Linux kernel v2.4.

Changes: A crack attempt is now made when breadth is changed. Previously cracks were tried only with each 10 new interesting packets. Several bugs were fixed.
tags | tool, kernel, protocol, wireless
systems | linux
MD5 | ac92126e252b34bda2a127a96916e02b
Posted Sep 25, 2002
Authored by Rossen Raykov

A vulnerability found in default Apache Tomcat 4.x installation can be used to remotely disclose the source of served JSP files. The Tomcat developers fixed this issue in the Tomcat versions 4.0.5 and 4.1.12, which are available here.

MD5 | ba05acdca9281dc87d66627c493a20d5
Posted Sep 25, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

WinME/XP UPNP denial of service exploit.

tags | denial of service
systems | windows
MD5 | ecd66b8e7a1bcabc8f0df50b5a5d9f5c
Posted Sep 25, 2002
Authored by Conundrum | Site soldierx.com

Voices is a *nix program that hides files in mp3's.

tags | encryption, steganography
MD5 | 39415ec51ec73ec765ae65450acba42f
Posted Sep 25, 2002
Authored by Gosper

Vbulletin/calender.php remote command execution exploit.

tags | exploit, remote, php
MD5 | 0569a0851a81caa5f67a940a3af6fe2d
Posted Sep 25, 2002
Authored by Delikon | Site delikon.de

Shellcode-v1.0.zip is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.

tags | shellcode
systems | windows
MD5 | b5c9bafe16f4b2a51ff0bfc98f0d076e
Posted Sep 25, 2002
Site apache.org

Apache v2.0.42 - Apache is the most popular webserver on the Internet, and ranks well in terms of security, functionality, efficiency, and speed. Changelog available here.

Changes: Fixed several bugs and memory leaks.
systems | unix
MD5 | 1ea73daf7626ae1e332da7618be81be9
Posted Sep 24, 2002
Authored by embyte | Site sourceforge.net

Gspoof is a GTK+ program written in C which makes easy and accurate the building and the sending of TCP packets with or without a data payload. It's possible to modify TCP/IP fields or the Ethernet header.

tags | tcp
systems | unix
MD5 | ac3a448d51eab10c8eda42fba925398a
Posted Sep 24, 2002
Authored by K1net1c

The Balaur Rootkit v2.0 is a rootkit for Red Hat 6.1 which is a descendant of lrk5. Contains a ssh backdoor, login backdoor, cron backdoor, adore, top, syslogd, and more. Patches common vulnerabilities to keep out other attackers.

tags | tool, vulnerability, rootkit
systems | linux, redhat, unix
MD5 | 56b9eb9fabe884ebc8bcb02aa5f065c2
Page 1 of 10

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    1 Files
  • 29
    Nov 29th
    11 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By