Exploit the possiblities
Showing 1 - 25 of 133 RSS Feed

Files Date: 2003-04-01 to 2003-04-30

xrunas11eval.zip
Posted Apr 27, 2003
Authored by Lazy Sysadmin | Site lazysysadmin.com

XRunAs is a tool that allows administrators to run commands on remote computers under the context of a specified user account without the use of the Schedule service. If XRunAs is used in conjunction with a domain account, commands that are run will be able to access network resources given that the domain account used to run the command has access to the network resource. All information that is transferred over the network while using XRunAs is encrypted using a standard encryption algorithm.

tags | remote
MD5 | 397f8b26a89af73eeae08ffe8a4ce367
klgr.tgz
Posted Apr 27, 2003
Authored by LyNx | Site rootteam.void.ru

klgr is a basic keylogger for Linux that loads as a module, but will hide from lsmod.

systems | linux
MD5 | 0b56b0ecae612a6c4e8e8118112ff3c0
ie-parse.txt
Posted Apr 27, 2003

The code used in Microsoft Internet Explorer to parse web servers' HTTP

tags | advisory, web
MD5 | 6878afb931fd5985c405d288d45fa042
ESc.c
Posted Apr 27, 2003
Authored by electronicsouls, Lunar Fault

(N)compress 4.2.4 local root exploit.

tags | local, root
MD5 | 505ae131e888c0d0a22039418427360e
truegalerie.txt
Posted Apr 27, 2003
Authored by Frog Man | Site frog-man.org

A problem exists in True Galerie v1.0 that allows a remote attacker to obtain administrative access to this utility due to misuse of cookies.

tags | exploit, remote
MD5 | 31b936edf4c3057a878bbb7c8906aae4
SRT2003-04-24-1532.txt
Posted Apr 27, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations Advisory SRT2003-04-24-1532 - The Options Parsing Tool shared library is vulnerable to a buffer overflow. If a setuid application makes use of this shared library privilege escalation can occur.

tags | advisory, overflow
MD5 | 592b58717877745e58131e754c44ead0
ie-heap1.txt
Posted Apr 27, 2003
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory NISR24042003 - There is an exploitable heap overflow vulnerability in Microsoft's ActiveX control, Plugin.ocx. By default, plugin.ocx is marked safe for scripting, and as such, if an IE user were to visit a malicious web page, the overflow could be triggered allowing for a remote compromise of the user's machine. Systems Affected: IE 5.01 SP3, 5.5 SP2, 6.0 Gold, 6.0 SP1.

tags | advisory, remote, web, overflow, activex
MD5 | 63f15558d91c060824426b7efab426e8
cisco-pass.txt
Posted Apr 25, 2003

Cisco Security Advisory: Cisco Catalyst software permits unauthorized access to the enable mode in the 7.5(1) release. Once initial access is granted, access can be obtained for the higher level "enable" mode without a password. This

tags | advisory
systems | cisco
MD5 | ed65a75f9c215c3ed65426ae5f12726a
les-exploit.c
Posted Apr 25, 2003
Authored by Angelo Rosiello, rosiello | Site dtors.net

Local root exploit for a stack overflow discovered in the linux-atm binary /usr/local/sbin/les.

tags | exploit, overflow, local, root
systems | linux
MD5 | f359e77f4c99e42da154156e7123b11d
0x4553_dr01d.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Ares

Flooding and sniffing robot for the IRC that attacks with spoof IGMP packets.

tags | spoof
MD5 | 63af2c82d90a2d5b92e74b28fdaedb7a
0x4553_asm_portscan.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Area

Full low level (without libc) AT+T port scanner written for the article "Advanced AT+T asm tutorial. Part 1".

MD5 | 28b35d884ce21e62291ea0c743262c8e
0x4553_Permutator.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Ares

Demo Permutate Engine for Linux that supports a few permutatable instructions: xor,sub,test,or,mov.

systems | linux
MD5 | 9b55c3f1df672a063cd3135f7959c0c9
0x4553_Executor.tar.gz
Posted Apr 24, 2003
Authored by electronicsouls, Ares

0x4553_Executor is a memory executor that allows a user to load code from file to memory and execute it.

MD5 | 9e2f0ef13aae43b88f908565e1143d63
secuniaXeneo.txt
Posted Apr 24, 2003
Authored by Carsten Eiram | Site secunia.com

A vulnerability in the Xeneo Web Server can be exploited by malicious attackers to cause a denial of service due to an error in the handling of requests including a malformed URL encoding representation of a character.

tags | advisory, web, denial of service
MD5 | e9a7cdaa8ec20c1eb42295ccd3a1423b
CiscoACS.txt
Posted Apr 24, 2003
Site cisco.com

Cisco Security Advisory - Cisco Secure ACS for Windows is vulnerable to a buffer overflow on the administration service which runs on TCP port 2002. Exploitation of this vulnerability results in a Denial of Service, and can potentially result in system administrator access. Cisco Secure ACS versions up to and including version 2.6.4 , 3.0.3, and 3.1.1 are affected by this vulnerability.

tags | advisory, denial of service, overflow, tcp
systems | cisco, windows
MD5 | 657c211471c31a5ea9d1f739db0a8ccd
p7snort191.sh
Posted Apr 24, 2003
Authored by truff | Site projet7.org

Snort 1.9.1 and below remote exploit. Related CERT Advisory is here. Tested on Slackware 8.0.

tags | exploit, remote
systems | linux, slackware
MD5 | 63efca99c7a60adabcf0f9933904337e
Nmap 3.20 Statistics Patch
Posted Apr 24, 2003
Authored by Ian Vitek | Site sekure.net

The Nmap 3.20 Statistics Patch adds the -c switch which guesses how much longer the scan will take, shows how many ports have been tested, resent, and the ports per second rate. Useful for scanning firewalled hosts.

tags | tool, nmap
systems | unix
MD5 | 8b2d99c9ce76001cd3dcd91ef4bed9b7
VapidSAP.txt
Posted Apr 24, 2003
Authored by Larry W. Cashdollar | Site vapid.dhs.org

SAP DB is vulnerable to a race condition during installation. The installer creates a world writable file that gets compiled and then is setuid to root. If a local attacker can overwrite the file in the alloted time-frame they will be able to escalate their privileges.

tags | exploit, local, root
MD5 | 707baa4e52349edd821816a0181694fe
yabbs01.txt
Posted Apr 23, 2003
Authored by FJ Serna | Site ngsec.com

Next Generation advisory NGSEC-2003-5. YABBS, the popular BBS system for unix and Windows, has a vulnerability in the HttPush code that allows a remote attacker to inject evil code via its PHP language support.

tags | advisory, remote, php
systems | windows, unix
MD5 | 8754ee0f7cea12d08dc7452ea9b42757
0x4553_Crypt0r.tar.gz
Posted Apr 22, 2003
Authored by electronicsouls, Ares

0x4553_Crypt0r is a base engine for encrypting ELF binaries. Uses simple bit rotation and allows for the ability to add your own algorithm.

MD5 | dd13841a031cc34078b2366a9b793cfe
Netric-RE-partII.pdf
Posted Apr 22, 2003
Authored by The Itch, netric, Gloomy | Site netric.org

Radical Environments part II - This paper continues where part one left off, detailing a technique in writing 0 bytes when exploiting a local buffer overflow using a non-executable stack with the heap being stored in memory at a virtual address containing a \x00 byte.

tags | overflow, local
MD5 | 6ae5f2cc150e8976d7d2778c6fb57fcd
envpaper.pdf
Posted Apr 22, 2003
Authored by The Itch, netric, Gloomy | Site netric.org

Radical Environments part I - A paper that compiles various stack related tips and tricks which discusses how an exploit without nops works.

MD5 | b567cc1c11e03fc568e88bd47b06c40c
fmtstring.txt
Posted Apr 22, 2003
Authored by The Itch, netric | Site netric.org

Detailed paper that describe format string vulnerabilities and how to exploit them.

tags | vulnerability
MD5 | 2c7f785aee10e30358c661caecdc1e8a
execve2.c
Posted Apr 22, 2003
Authored by The Itch, netric | Site netric.org

Linux x86 shellcode (31 bytes) which does setuid(0); execve ("/bin/sh",0);

tags | x86, shellcode
systems | linux
MD5 | 631d25b8d5e04b0f33edfdd22ab50404
sp-xeneo.pl
Posted Apr 22, 2003
Authored by Badpack3t | Site security-protocols.com

The Xeneo Web Server v2.2.9.0 is vulnerable to a Denial of Service attack when a GET request with 4096 ?'s are received. Tested against Windows XP Pro SP1 and Windows 2000 SP3.

tags | exploit, web, denial of service
systems | windows, 2k, xp
MD5 | 6005e09c96be815df9a48d1c3c802832
Page 1 of 6
Back12345Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close