exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2003-07-28

imapd_overflow
Posted Jul 28, 2003
Authored by sac, LexLufix | Site sac.cc

Description of a simple buffer overflow attack against older IMAP servers developed by the University of Washington.

tags | advisory, overflow, imap
SHA-256 | 801b38cc3b6e3bf19304acdeb6078697e05b7feabd89dcdfedd58d3099098ccd
zappa-0.2.c
Posted Jul 28, 2003
Authored by sac, Soeren Bleikertz | Site sac.cc

A backdoor which waits for an ICMP packet and then connects with a UDP server on the client. v0.2

tags | udp
SHA-256 | f7ee9dcfe3b1e7c2bde267a0510f1210573dc52b3c5ad843f4436f19feec2445
benjurry.txt
Posted Jul 28, 2003
Authored by FlashSky, Benjurry | Site xfocus.org

Thorough analysis of the buffer overrun in the Windows RPC interface that was discovered by the Last Stage of Delirium. Exploit included for Windows 2000 SP4 Chinese version.

tags | exploit, overflow
systems | windows
SHA-256 | 6a46de63d03e6910e4235d4653d7f7572b05b83813037adebbcf6a580f52cbe1
operalong.txt
Posted Jul 28, 2003
Authored by dodo | Site darkwired.org

Opera version 7.0 and 6.12 is vulnerable to a buffer overflow that results in a crash when redirected with a long URL.

tags | advisory, overflow
SHA-256 | 9ba3231d475b450b82ab4bcb3dac5dbc752e08e1814ab64a42481436815ecd0d
Gobbler-2.0.1-Alpha1.tar.gz
Posted Jul 28, 2003
Authored by STE Jones | Site networkpenetration.com

Gobbler is a tool designed to audit various aspects of DHCP networks, from detecting if DHCP is running on a network to performing a denial of service attack. Gobbler also exploits DHCP and ethernet, to allow distributed spoofed port scanning with the added bonus of being able to sniff the reply from a spoofed host. This tool is based on proof of concept code "DHCP Gobbler" available from networkpenetration.com and the DHCP flaws paper.

Changes: Added port 0 fingerprinting, bug fixes.
tags | tool, denial of service, spoof, rootkit, proof of concept
systems | unix
SHA-256 | 28547ebff2666e8695d9c5e76a8063c0a32e0fc3e55e54aa0f70c4206c761b56
port0paper.txt
Posted Jul 28, 2003
Authored by STE Jones | Site networkpenetration.com

Paper discussing utilization of port zero for OS fingerprinting and how to protect against it.

tags | paper
SHA-256 | bbe9a71a165db0e8b2e6a2f2d5c437c544faf4ba99ad3d4c8737d4bf2ef584a0
illmob.txt
Posted Jul 28, 2003
Site illmob.org

Paper discussing utilization of the Win32 exploit for the DCOM RPC vulnerability.

tags | paper
systems | windows
SHA-256 | ac991411216d76522190300a8ee9d05dc9d1eee9a92a9af2f72a6cffa66b6bb9
sambash-release.c
Posted Jul 28, 2003
Authored by flatline

Remote root exploit for samba 2.2.7a and below using reply_nttrans(). Written for the Linux x86 platform.

tags | exploit, remote, x86, root
systems | linux
SHA-256 | d92d52b7bdffc81559e9c811bfbce60c3ac57434a8318be8a5f08c724eaa127b
DComExpl_UnixWin32.zip
Posted Jul 28, 2003
Authored by Benjamin Lauziere

Windows port of the remote exploit utilizing the DCOM RPC overflow originally coded by H D Moore.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 98186a16043a537eb59eec975695e217b9043d1747d7a414c37c888c6b72be38
dcom.c
Posted Jul 28, 2003
Authored by H D Moore | Site metasploit.com

Remote exploit utilizing the DCOM RPC overflow discovered by LSD. Includes targets for Windows 2000 and XP. Binds a shell on port 4444.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | aac1c914909b279cffcee8699eff0774f5962b99d0dbd3ed2a80f12fa7a64d4a
ACME-mitel.txt
Posted Jul 28, 2003
Authored by Acme | Site olografix.org

An interesting bug in the Mitel Voice Over IP system that allows an attacker to discover phone numbers calling through the DHCP server.

tags | exploit
SHA-256 | 1ed33fcc27a383016afe3811d1aa56ff46a4cdcfdf95bf1b10d6082b6b4ffcdb
CA-2003-18.directx.txt
Posted Jul 28, 2003
Site cert.org

CERT Advisory CA-2003-18 - CERT announces that a set of integer overflows exists in a DirectX library included in Microsoft Windows. An attacker could exploit this vulnerability to execute arbitrary code or to cause a denial of service.

tags | advisory, denial of service, overflow, arbitrary
systems | windows
SHA-256 | eafbaabf97c03108de6117e44f1d1a3d553ac31d3dabf02f3f7f03ac596520c5
NGSextproc.txt
Posted Jul 28, 2003
Authored by David Litchfield, Chris Anley | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR25072003 - In an attempt to fix previous vulnerabilities discovered by NGSSoftware, the Oracle RDBMS fix patched the hole but left a logging function vulnerable to a stack overflow.

tags | advisory, overflow, vulnerability
SHA-256 | 237dd712fc93400a7d9eed9e111f3ab5238fd5fcb2322857fa12ec0d69be3187
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    11 Files
  • 30
    Jun 30th
    7 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close