exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2003-06-11

redfang.tar.gz
Posted Jun 11, 2003
Authored by Ollie Whitehouse | Site atstake.com

fang is a small proof-of-concept application to find non discoverable bluetooth devices. This is done by brute forcing the last six (6) bytes of the bluetooth address of the device and doing a read_remote_name().

tags | tool, wireless
SHA-256 | 945fa08d2db2da2eb13cd4bc4bf7ca8b42c3f19daac89a8d244fa205bfcd41e5
openssh-3.6.1p2+SecurID_v1.patch
Posted Jun 11, 2003
Site omniti.com

This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.

Changes: Supports both new (5.X+) and old (<=3D 4.X) securid client API libraries.
tags | patch
systems | unix
SHA-256 | 1ac81f168242749009676261c22cae1a836b0a6b70111282cd3ba3d7b398caca
unmaskv2.tar.gz
Posted Jun 11, 2003
Authored by Serkan Akpolat | Site core.gen.tr

Unmask is a simple md5 cracking utility that will attempt to find the true IP address of a fake host using Trircd 5.0 and PTlink.

SHA-256 | b0c51a9f11f227a13b24456b72a96c5bc6d4f45d14b1af2e5b087f11b6cdd7b3
mwmxploit.c
Posted Jun 11, 2003
Authored by ThreaT

Remote format string exploit for Magic Winmail Server version 2.3. Sending a format string in the USER field during the authentication process, a remote attacker can cause the server to execute arbitrary code.

tags | exploit, remote, arbitrary
SHA-256 | 3500425cf62ca44b00af89fefa96dcebeb90a65e3253fbf1c84596b3df100aeb
htmlbar.msi
Posted Jun 11, 2003
Authored by Richard van den Berg | Site vdberg.org

HTML Source Code Explorer Bar 2.0 is a plug-in for Internet Explorer that allows you to view the form fields for any HTML form being served and easily repopulate the fields (even hidden fields) with the input of your choice and submit the data. This tool can be very useful for penetration testing input validation on CGI scripts, etc.

tags | web, cgi
SHA-256 | b83e6392af3df04eef20b40df66d69a189095649aaf2bff9ece7e6dec15bc584
bufferpaper.txt
Posted Jun 11, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

This paper goes into great detail describing how to utilize format string attacks with limited buffer space.

tags | paper
SHA-256 | 26e76a849776b6bb6aed421c8c8e7c19ea279402faae685b8acaa53a90afbbd9
sendtcp.c
Posted Jun 11, 2003
Authored by messer

sendtcp.c v0.1 is a simple TCP packet generator for the win32 platform.

tags | tcp
systems | windows
SHA-256 | 7af982f217dfe69a3c11877335907b115cd1b91f172b720b530c795af375f6b1
atftpdx.c
Posted Jun 11, 2003
Authored by Gunzip

Proof of concept remote root exploit for atftpd version 0.6. Makes use of the filename overflow found by Rick Patel. Tested against Debian 3.0.

tags | exploit, remote, overflow, root, proof of concept
systems | linux, debian
SHA-256 | 9f6808a16e0468c6d54152cfeec1e9d9af5e7c3678ec1fac83789785f111fae5
aimcrack-0.1.tar.gz
Posted Jun 11, 2003
Authored by methodic | Site libpcap.net

Utility to brute-force AIM screenames and passwords. In a list of about 1500 passwords, aimcrack takes about 2 hours on a cable modem connection.

SHA-256 | 8a31be4fe67114eca89d80ed2320768f4dfad6d2e8e37c1bbc41a3238e7bf9a3
SRT2003-06-05-0935.txt
Posted Jun 11, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations Advisory SRT2003-06-05-0935 - The ftpd that comes default with HPUX 11 is vulnerable to an attack that will allow an attacker to view the contents of any file on the system without first authenticating. To patch this, install HPUX patch PHNE_21936 or higher.

tags | advisory
systems | hpux
SHA-256 | ca94fbeffc52d8737dabb08617866e580015a18548c6d5700a7f24fa31421685
mencari_asal_usul.pl
Posted Jun 11, 2003
Authored by Pokleyzz, s0cket370 | Site scan-associates.net

Proof of concept exploit for mnoGoSearch 3.2.10 that spawns a shell as the webserver user id by overflowing the tmplt variable.

tags | exploit, overflow, shell, proof of concept
SHA-256 | c15d5316bdf16f81657526878c11a47b32fd6928f4c75148f179c287d6f99817
mencari_sebuah_nama.pl
Posted Jun 11, 2003
Authored by Pokleyzz | Site scan-associates.net

Proof of concept exploit for mnoGoSearch 3.1.20 that performs remote command execution as the webserver user id.

tags | exploit, remote, proof of concept
SHA-256 | 168a6ae597d201173eb31793c1ca63cc6a43809ec5bbf130f10d5b38f5213886
mnogosearch.txt
Posted Jun 11, 2003
Authored by Pokleyzz | Site scan-associates.net

mnGoSearch, formerly known as UdmSearch, has buffer overflow vulnerabilities in versions 3.1.20 and 3.2.10. In 3.1.20, the ul variable can be overflowed to allow remote command execution as the webserver user id. In 3.2.10, a remote attacker can crash search.cgi by overflowing the tmplt variable.

tags | advisory, remote, overflow, cgi, vulnerability
SHA-256 | ac17442c31b15e3413d421ae705ffc5b64ba90f58e3a9a45847804e8ab31da87
atftpd.patch
Posted Jun 11, 2003
Authored by Gunzip

Simple patch to fix the overflow found in atftpd by Rick Patel.

tags | overflow, patch
systems | unix
SHA-256 | bbb74dfb5d52103ab35a78f731663aae5244b396ecaa1b98451767508ae1c094
MollensoftFTPServer3.5.2.txt
Posted Jun 11, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

Mollensoft Hyperion FTP Server version 3.5.2 is vulnerable to multiple buffer overflows that affect the cwd, mkd, rmd, stat, and nlst commands. Use of the overflows allow a remote attacker to cause a denial of service and there is the possibility of arbitrary code execution.

tags | advisory, remote, denial of service, overflow, arbitrary, code execution
SHA-256 | 8f2e8ae2402a5f86274866eb84ecb38d70550e59db91e4899c4661a2e0f09d85
proxychains-1.8.2.tar.gz
Posted Jun 11, 2003
Authored by Proxy Labs | Site proxylabs.com

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: Minor bugfixes, improved compilation on FreeBSD, OpenBSD, and Sun Solaris, and addressed some cross platform issues.
tags | web, tcp
systems | linux, unix, solaris
SHA-256 | e919bd37f15dce9b792a32f5385ff70b84c09f6fdc10ce4f15e0b6d7aedad71e
x_diagrpt_aix5l_4x.sh
Posted Jun 11, 2003
Authored by Watercloud | Site xfocus.org

Local root exploit for the diagrpt command on AIX 5.x and 4.x.

tags | exploit, local, root
systems | aix
SHA-256 | ea76fd0e38b7dc4fdbc4ca8ecf5110ed81045a414cff5c409777afa873f01ad8
x_errpt_aix5.pl
Posted Jun 11, 2003
Authored by Watercloud | Site xfocus.org

Local root exploit for the errpt command on AIX5L.

tags | exploit, local, root
SHA-256 | e3ea043de54e16662166f004a6421bfbc615b1dae74eb7573d3e48d6a8e56cda
x_lsmcode_aix4x.pl
Posted Jun 11, 2003
Authored by Watercloud | Site xfocus.org

Local root exploit for the command lsmcode on AIX 4.3.3.

tags | exploit, local, root
systems | aix
SHA-256 | 2fe67fa839a51b0dec7666b43d6df49f44ba93f7e2fa676f1864caf575b06a7b
Page 1 of 1
Back1Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    8 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close