exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files Date: 2003-06-11

redfang.tar.gz
Posted Jun 11, 2003
Authored by Ollie Whitehouse | Site atstake.com

fang is a small proof-of-concept application to find non discoverable bluetooth devices. This is done by brute forcing the last six (6) bytes of the bluetooth address of the device and doing a read_remote_name().

tags | tool, wireless
MD5 | 4ca33a09c0827cf0a5136c175a91cae3
openssh-3.6.1p2+SecurID_v1.patch
Posted Jun 11, 2003
Site omniti.com

This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.

Changes: Supports both new (5.X+) and old (<=3D 4.X) securid client API libraries.
tags | patch
systems | unix
MD5 | 5c500a839f95247ea6e377046a9ea913
unmaskv2.tar.gz
Posted Jun 11, 2003
Authored by Serkan Akpolat | Site core.gen.tr

Unmask is a simple md5 cracking utility that will attempt to find the true IP address of a fake host using Trircd 5.0 and PTlink.

MD5 | 79d1834bf3709af49ee862cd327e70b0
mwmxploit.c
Posted Jun 11, 2003
Authored by ThreaT

Remote format string exploit for Magic Winmail Server version 2.3. Sending a format string in the USER field during the authentication process, a remote attacker can cause the server to execute arbitrary code.

tags | exploit, remote, arbitrary
MD5 | bc4b3a125db454c2cc7c1c8d94b2de65
htmlbar.msi
Posted Jun 11, 2003
Authored by Richard van den Berg | Site vdberg.org

HTML Source Code Explorer Bar 2.0 is a plug-in for Internet Explorer that allows you to view the form fields for any HTML form being served and easily repopulate the fields (even hidden fields) with the input of your choice and submit the data. This tool can be very useful for penetration testing input validation on CGI scripts, etc.

tags | web, cgi
MD5 | 7abc1851659bb76fb79605c27dd03f17
bufferpaper.txt
Posted Jun 11, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

This paper goes into great detail describing how to utilize format string attacks with limited buffer space.

tags | paper
MD5 | c533bdbebb1fc4a96cf43dbff879cdc5
sendtcp.c
Posted Jun 11, 2003
Authored by messer

sendtcp.c v0.1 is a simple TCP packet generator for the win32 platform.

tags | tcp
systems | windows
MD5 | 590dff67036a23fcb1afc7bef48e9656
atftpdx.c
Posted Jun 11, 2003
Authored by Gunzip

Proof of concept remote root exploit for atftpd version 0.6. Makes use of the filename overflow found by Rick Patel. Tested against Debian 3.0.

tags | exploit, remote, overflow, root, proof of concept
systems | linux, debian
MD5 | 3b0c2689d61a4f537485d01ed45b9bbb
aimcrack-0.1.tar.gz
Posted Jun 11, 2003
Authored by methodic | Site libpcap.net

Utility to brute-force AIM screenames and passwords. In a list of about 1500 passwords, aimcrack takes about 2 hours on a cable modem connection.

MD5 | 9916cd5615f647edf5128f898a982b42
SRT2003-06-05-0935.txt
Posted Jun 11, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations Advisory SRT2003-06-05-0935 - The ftpd that comes default with HPUX 11 is vulnerable to an attack that will allow an attacker to view the contents of any file on the system without first authenticating. To patch this, install HPUX patch PHNE_21936 or higher.

tags | advisory
systems | hpux
MD5 | de85baf9ed049866832200e258542247
mencari_asal_usul.pl
Posted Jun 11, 2003
Authored by Pokleyzz, s0cket370 | Site scan-associates.net

Proof of concept exploit for mnoGoSearch 3.2.10 that spawns a shell as the webserver user id by overflowing the tmplt variable.

tags | exploit, overflow, shell, proof of concept
MD5 | ff1626622aef6a8e88152d7dc2cd1db5
mencari_sebuah_nama.pl
Posted Jun 11, 2003
Authored by Pokleyzz | Site scan-associates.net

Proof of concept exploit for mnoGoSearch 3.1.20 that performs remote command execution as the webserver user id.

tags | exploit, remote, proof of concept
MD5 | 3ea57b0506231feae8a55fbfd3b65820
mnogosearch.txt
Posted Jun 11, 2003
Authored by Pokleyzz | Site scan-associates.net

mnGoSearch, formerly known as UdmSearch, has buffer overflow vulnerabilities in versions 3.1.20 and 3.2.10. In 3.1.20, the ul variable can be overflowed to allow remote command execution as the webserver user id. In 3.2.10, a remote attacker can crash search.cgi by overflowing the tmplt variable.

tags | advisory, remote, overflow, cgi, vulnerability
MD5 | d2d980d8b39388df16f9838e66d33881
atftpd.patch
Posted Jun 11, 2003
Authored by Gunzip

Simple patch to fix the overflow found in atftpd by Rick Patel.

tags | overflow, patch
systems | unix
MD5 | 056d61425e87567ddcedc6188e7b99fa
MollensoftFTPServer3.5.2.txt
Posted Jun 11, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

Mollensoft Hyperion FTP Server version 3.5.2 is vulnerable to multiple buffer overflows that affect the cwd, mkd, rmd, stat, and nlst commands. Use of the overflows allow a remote attacker to cause a denial of service and there is the possibility of arbitrary code execution.

tags | advisory, remote, denial of service, overflow, arbitrary, code execution
MD5 | 534fa8af4ba66004411b9fbaf7ab7045
proxychains-1.8.2.tar.gz
Posted Jun 11, 2003
Authored by Proxy Labs | Site proxylabs.com

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: Minor bugfixes, improved compilation on FreeBSD, OpenBSD, and Sun Solaris, and addressed some cross platform issues.
tags | web, tcp
systems | linux, unix, solaris
MD5 | 276ad24c2680010a96f5e027ea27dcee
x_diagrpt_aix5l_4x.sh
Posted Jun 11, 2003
Authored by Watercloud | Site xfocus.org

Local root exploit for the diagrpt command on AIX 5.x and 4.x.

tags | exploit, local, root
systems | aix
MD5 | 5d36c3adbc1f71fc8566484e1108ddee
x_errpt_aix5.pl
Posted Jun 11, 2003
Authored by Watercloud | Site xfocus.org

Local root exploit for the errpt command on AIX5L.

tags | exploit, local, root
MD5 | 0dc05e7224556cd69e3248a91adcbbce
x_lsmcode_aix4x.pl
Posted Jun 11, 2003
Authored by Watercloud | Site xfocus.org

Local root exploit for the command lsmcode on AIX 4.3.3.

tags | exploit, local, root
systems | aix
MD5 | f0c9c81406cc272571d2840964f00ef5
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close