exploit the possibilities
Showing 1 - 25 of 97 RSS Feed

Files Date: 2003-06-01 to 2003-06-30

Posted Jun 29, 2003
Authored by Brett Moore SA | Site security-assessment.com

Windows Media Services Remote Command Execution - There is a flaw in the way nsiislog.dll processes incoming client requests. A vulnerability exists because an attacker could send specially formed HTTP request to the server that could cause IIS to fail or execute code on the system.

tags | advisory, remote, web
systems | windows
MD5 | 884971311330a4b4a7e0c942d694fe37
Posted Jun 29, 2003
Authored by Carsten Eiram | Site secunia.com

Secunia Security Advisory - The FTPServer/X FTP Server Control and COM Object v1.00.045 and v1.00.046 are vulnerable to buffer overflow that results in a denial of service and potentially can enable a remote attacker to gain access to the machine.

tags | exploit, remote, denial of service, overflow
MD5 | 941f08cf9a416bbeab1599ebbeadaa93
Posted Jun 29, 2003
Authored by Pierre CARON

Domino Hunter is a Lotus Domino web server scanner, written in Perl. It attempts to access default NSF databases, as well as crawl user-defined bases. It tries to enumerate the database structure, enumerate available views, available documents, and ACLs set on documents. It also tries to retrieve documents from available views in order to check if ACLs are correctly set to restrict documents and not views. The scanner works in both anonymous mode or privileged mode if user supplied credentials are supplied to then be passed to the default names.nsf/?Login form.

tags | tool, web, scanner, perl
systems | unix
MD5 | 6abc393845374a05d146c3c2002dd1b2
Posted Jun 29, 2003
Authored by Gunzip | Site members.xoom.it

Linux x86 UDP shellcode. Reads from UDP port 13330 to retrieve other shellcode then executes it.

tags | x86, udp, shellcode
systems | linux
MD5 | 69dfb886894b63b8e8b6ec56e334da60
Posted Jun 29, 2003
Authored by STE Jones | Site networkpenetration.com

By using the OpenBSD packet filter pf, one can utilize the NAT address pools added into OpenBSD 3.3 to aid in distributed port scanning.

tags | tool, scanner
systems | unix, openbsd
MD5 | 5cdea564000cf07587c68705b8111c67
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Paper written about the art of brute force cracking that comes with example code.

tags | paper
MD5 | 97b6bcfd74b5fe9ce55a5aa8cf7f0e8c
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Dirtybrute is an advanced multi threaded program that demonstrates the use of a brute force engine which has many options such as the ability to resume cracking sessions for both brute force mode and dictionary attacks. Currently supports remote MSN messenger cracking sessions.

tags | remote, cracker
MD5 | 0a2867cda006a3ccd2697b1b67bc1935
Posted Jun 29, 2003
Authored by Lion | Site cnhonker.com

Microsoft Windows RPC Denial of Service utility.

tags | denial of service
systems | windows
MD5 | 84a5189109eaa0b5d71c109e32d8fd39
Posted Jun 29, 2003
Authored by Knud Erik Hojgaard

Gkrellmd 2.1.10 remote exploit with shellcode that does kill(-1,9) then an exit. Written for Linux and tested on Slackware 9.

tags | exploit, remote, shellcode
systems | linux, slackware
MD5 | 4ccf4b85bdadaaaeea4abd31891779f4
Posted Jun 29, 2003
Authored by van Hauser, thc | Site thc.org

THC Modem Login Hacker - A tool that will attempt to break into modem dialups using scripts written for minicom. Extremely configurable and a must have for any penetration test.

MD5 | 73d0b6398194c65e3ddd67741fe2adcd
Posted Jun 29, 2003
Authored by r-code

gkrellmd < 2.1.12 remote exploit for Linux. Tested against Debian 3.0 with version 2.1.4.

tags | exploit, remote
systems | linux, debian
MD5 | 2eb2a5c1a727b39eab68acb29858ea39
Posted Jun 28, 2003
Authored by IhaQueR

Local root exploit that makes use of a race condition vulnerability found in the Linux execve() system call that affects the 2.4 kernel tree.

tags | exploit, kernel, local, root
systems | linux
MD5 | 4f95beb18386eb443765c00154f4bc3f
Posted Jun 25, 2003
Authored by qitest1 | Site bespin.org

A short paper discussing exploitation of vulnerabilities consisting of a null byte written passed the end of a dynamically allocated buffer.

tags | paper, vulnerability
MD5 | 34476d3f8b558ed26ed7286d96e42509
Posted Jun 25, 2003
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2406-03 - WebAdmin.exe, a utility that allows remote administrators to control MDaemon, RelayFax, and WorldClient, has a remotely exploitable buffer overrun in the USER parameter that would allow a remote attacker to execute arbitrary code on the server.

tags | advisory, remote, overflow, arbitrary
MD5 | a9fad58fc9ca8bf01e6e1040fcf5cfae
HexView Security Advisory 2003-06-07.01
Posted Jun 25, 2003
Authored by HexView, SGI Security | Site sgi.com

SGI Security Advisory 20030607-01-P - Several bugs in the IRIX 6.5.19 implementation of IPv6 result in inetd becoming hung when port scanned, snoop unable to handle packets as root, and other non-security related issues.

tags | advisory, root
systems | irix
MD5 | 99d2e0ce6890eb6a4b4d3ae5e453c5d5
Posted Jun 25, 2003
Authored by B-r00t

Kerio Mail Server 5.6.3 remote buffer overflow exploit. Adds wide open root account to /etc/passwd. Written based upon the vulnerability discussed here.

tags | exploit, remote, overflow, root
MD5 | 842c5e7826baf9519f128b2ea7d11c1b
Posted Jun 25, 2003
Authored by xenion | Site xenion.antifork.org

This utility provides a datalink bridge working in userspace that allows captured packets from one ethernet interface to be retransmitted over a non-ethernet interface.

tags | tool, sniffer
MD5 | 2ac6a902e2a85f26389e97b24217456e
Posted Jun 24, 2003
Authored by Knud Erik Hojgaard

Gkrellmd 2.1.10 remote exploit with connect back shellcode. Tested on FreeBSD 4.8.

tags | exploit, remote, shellcode
systems | freebsd
MD5 | 19d0e595e3075a1352589025fa029087
Posted Jun 24, 2003
Authored by Niels Provos | Site citi.umich.edu

Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Changes: This release includes faster routing lookups, asymmetric routing, GRE tunneling, plugins and configuration systems, integration of physical machines into the virtual routing topology for network simulation, performance improvements, and several bugfixes.
tags | tool, arbitrary, tcp, intrusion detection
systems | unix
MD5 | 20cc97bee4188ccad9831292bbdb885c
Posted Jun 24, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-06-20-123 - The Progress 4GL Compiler version 9.1D06 and below has a datatype buffer overflow that can be exploited if a malicious .p file is compiled. Both the Win32 and Unix variants are affected by this.

tags | advisory, overflow
systems | windows, unix
MD5 | bb498839551e11ac1506f58d96c4a5b5
Posted Jun 24, 2003
Authored by Francois SORIN | Site kereval.com

Kereval Security Advisory KSA-001 - Cross Site Scripting vulnerabilities exist in Tutos 1.1 allow for hostile code execution.

tags | exploit, vulnerability, code execution, xss
MD5 | dfed6e294cfba88c4ce010d032e6dcdf
Posted Jun 24, 2003
Authored by dsr, Knud Erik Hojgaard

Exploit for Elm version ko-elm-2.4h4.1, the Korean release, that yields gid of bin. Old vulnerability related to this is here. Tested against FreeBSD 4.7.

tags | exploit
systems | freebsd
MD5 | 0d17996f879f53f34e331038462c23b4
Posted Jun 24, 2003
Authored by Davide Fais, Stefano Frassi, Filippo Giuntini, Luca Pugliese | Site widsards.sourceforge.net

wIDSard is a host-based Intrusion Detection System for i386 Linux platform. It intercepts, at user level, system calls specified in a configuration file written by the user. A finite-state automater is used to trace the monitored process. The language used for the configuration file is regular expression based. If a particular sequence of system calls is intercepted than an appropriate action could be executed.

tags | tool, intrusion detection
systems | linux, unix
MD5 | b3b6ea301dec4bcabfdadd169e5077ff
Posted Jun 24, 2003
Authored by Maik Pfeil, Martin Kluge, Patrick Kaiser | Site aa-security.de

The APSR project is a network testing suite, designed to send, receive and analyze arbitrary network packets on different kinds of networks. It can be used to test firewalls, routing, security and many other networking functionalities. The main goal of the APSR project is to develop a high quality network testing suite.

tags | tool, arbitrary
systems | unix
MD5 | f51c6c8bc375609d1443198df4562437
Posted Jun 24, 2003
Authored by Tod Beardsley | Site planb-security.net

Remote OS fingerprinting tool written in Perl that analyzes the retransmission timeout lengths of a TCP handshake to detect remote operating systems.

tags | tool, remote, scanner, perl, tcp
systems | unix
MD5 | cbe0db6081b8fb1c0cd46a7f1f3f31a6
Page 1 of 4

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    1 Files
  • 29
    Nov 29th
    11 Files
  • 30
    Nov 30th
    7 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By