exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2003-04-03

iehist-src-0_0_1.zip
Posted Apr 3, 2003
Authored by Patrik Karlsson | Site cqure.net

IEHist dumps Internet Explorer history from index.dat files into delimited files suitable for import into other tools.

SHA-256 | b8aa5e9a301292fd275a632be35c3791be8407e584979256137f32203de3a450
vncpwdump-src-1_0_0.zip
Posted Apr 3, 2003
Authored by Patrik Karlsson | Site cqure.net

VNCPwdump can be used to dump and decrypt the registry key containing the encrypted VNC password in a few different ways. It supports dumping and decrypting the password by: Dumping the current users registry key, retrieving it from a NTUSER.DAT file, decrypting a command line supplied encrypted password, and injecting the VNC process and dumping the owner's password.

tags | cracker, registry
SHA-256 | ebf49f069d3620f60c4c84681dfca3061ff616033ee023578474e84bc7623eed
passifist_src_1.0.0.tgz
Posted Apr 3, 2003
Authored by Patrik Karlsson | Site cqure.net

Passifist is a tool for passive network discovery. It could be used for a number of different things, but was mainly written to discover hosts without actively probing a network. The tool analyzes broadcast traffic and has a plugin architecture through which it dissects and reports services found. Initial version holds support for the following protocols and plugins: CDP, CIM, HSRP, IPX, NETOP, SMB, TFTP.

tags | tool, sniffer, protocol
SHA-256 | 8bc5231456824abbfdbf91481823c7a14a7be0f5e42fc530de99aeb9ac3314bb
safemode-adv-chitext.txt
Posted Apr 3, 2003
Authored by Zillion | Site safemode.org

ChiTeX, the utility used to put Chinese Big5 codes in TeX/LaTeX documents, contains two setuid root binaries that execute cat without using an explicit path allowing an attacker to easily gain root privileges.

tags | exploit, root
SHA-256 | 1c2236c651538e4aaaa0b8f89bbc85cd212f6cf79eed7e9609ddef1998071e56
0x82-Remote.passlogd_sniff.xpl.c
Posted Apr 3, 2003
Authored by Xpl017Elz | Site inetcop.org

Remote exploit for the buffer overrun found in passlogd. Target list includes four flavors of Linux with more to come.

tags | exploit, remote, overflow
systems | linux
SHA-256 | 37b269945b84e22d48de5f5d785c67d39f7bf09b5346f96a621bc6647022fc26
sbfprint.txt
Posted Apr 3, 2003
Authored by Necrose | Site truncode.org

Service Banner Fingerprinting in C - This paper is a supplement to modular's tcpscan series. It covers how to write C programs that will perform banner fingerprinting using various standard servers as examples.

tags | paper
SHA-256 | e235c26539ac8a622e503b130f1fea2dec6c57ae8c0f9b6cd3ed0564bfe69c95
mtrewt.c
Posted Apr 3, 2003

Local root exploit for mtr versions lower than 4.0.6. Vulnerability originally found by KF of Snosoft.

tags | exploit, local, root
SHA-256 | d8abcbb929ad05dfb21ec534c2ad715d568011e3df645bbfcfb8825327e5eb29
pingbish.c
Posted Apr 3, 2003

Local root exploit for ntping vulnerability discovered by KF of Snosoft.

tags | exploit, local, root
SHA-256 | 174e33b3e8617e4b37bf7ac6e72751b288a801da064c5eda214b0b9950eea5d9
passlogd.txt
Posted Apr 3, 2003
Authored by Xpl017Elz | Site inetcop.org

A buffer overrun exists in passlogd, the passive syslog capture daemon, in the parse.c code.

tags | exploit, overflow
SHA-256 | 187f1c045d7ee8745a0af71546b8d5dde0458959b31d7fdf3347f791fc3439c7
lkminject.sh
Posted Apr 3, 2003
Authored by truff

lkminject is a script that builds a binary which will allow you to inject a module inside of a kernel module.

tags | kernel
systems | linux
SHA-256 | 20a13dd3a35002ac4722687a293c51b5fe9af4d0bed3092f3e47e75c4ddcc65e
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close