what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2003-04-24

0x4553_dr01d.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Ares

Flooding and sniffing robot for the IRC that attacks with spoof IGMP packets.

tags | spoof
SHA-256 | c9511dfcec990896079ce0509d8e7a92f5cf2d5ffb168064ff03db42d335fcdc
0x4553_asm_portscan.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Area

Full low level (without libc) AT+T port scanner written for the article "Advanced AT+T asm tutorial. Part 1".

SHA-256 | b351a9da40051ae17249d3db2ddf289d051cdd7d92fc3d6c2836ab9d5b54a53d
0x4553_Permutator.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Ares

Demo Permutate Engine for Linux that supports a few permutatable instructions: xor,sub,test,or,mov.

systems | linux
SHA-256 | be15fb2bca26a61637e15f8fde38dd123b6a33c3b416fc9a541a0d9f8ac3d003
0x4553_Executor.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Ares

0x4553_Executor is a memory executor that allows a user to load code from file to memory and execute it.

SHA-256 | ee6f412dcf6e5016ccb3bd30d093edd27679edf336bc268f7b36e79104c28552
secuniaXeneo.txt
Posted Apr 24, 2003
Authored by Carsten Eiram | Site secunia.com

A vulnerability in the Xeneo Web Server can be exploited by malicious attackers to cause a denial of service due to an error in the handling of requests including a malformed URL encoding representation of a character.

tags | advisory, web, denial of service
SHA-256 | 893273caaeca2a5baa326a0456742a7e0d82e24c4657dbd8a249341dabfc93f5
CiscoACS.txt
Posted Apr 24, 2003
Site cisco.com

Cisco Security Advisory - Cisco Secure ACS for Windows is vulnerable to a buffer overflow on the administration service which runs on TCP port 2002. Exploitation of this vulnerability results in a Denial of Service, and can potentially result in system administrator access. Cisco Secure ACS versions up to and including version 2.6.4 , 3.0.3, and 3.1.1 are affected by this vulnerability.

tags | advisory, denial of service, overflow, tcp
systems | cisco, windows
SHA-256 | 480f30faba4a7dc1e5a194019281b719a20ce957e96e56bdb9b229dec2c34792
p7snort191.sh
Posted Apr 24, 2003
Authored by truff | Site projet7.org

Snort 1.9.1 and below remote exploit. Related CERT Advisory is here. Tested on Slackware 8.0.

tags | exploit, remote
systems | linux, slackware
SHA-256 | 6fb5c8a0246dcb6a64973e1f4f80cc826590cb7b7f3484e6026b64722e722d57
Nmap 3.20 Statistics Patch
Posted Apr 24, 2003
Authored by Ian Vitek | Site sekure.net

The Nmap 3.20 Statistics Patch adds the -c switch which guesses how much longer the scan will take, shows how many ports have been tested, resent, and the ports per second rate. Useful for scanning firewalled hosts.

tags | tool, nmap
systems | unix
SHA-256 | 4544455af5ab0ed47cbcb4e33e29760ad56ff4235407df2e003cab38ff519257
VapidSAP.txt
Posted Apr 24, 2003
Authored by Larry W. Cashdollar | Site vapid.dhs.org

SAP DB is vulnerable to a race condition during installation. The installer creates a world writable file that gets compiled and then is setuid to root. If a local attacker can overwrite the file in the alloted time-frame they will be able to escalate their privileges.

tags | exploit, local, root
SHA-256 | 133ef0c808730e0896b10d01e7b0daaaf775415dcf0f90ca80ffebe268a51845
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close