exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2004-05-01

etherdam-0.2.tar.gz
Posted May 1, 2004
Authored by Kelledin | Site etherdam.sf.net

The etherdam utility is an IPTables firewall configuration engine. It implements a primitive scripting language as an alternative to the direct use of iptables. It comes with full documentation plus a heavily commented example configuration file. The configuration file should work for many scenarios with minimal adjustment.

tags | tool, firewall
systems | linux
SHA-256 | df9edbb0f8fc948fb608a2b82464df46b4665703551e9d38dd7c28b5af2a28d7
aexpl-1.0.tar.gz
Posted May 1, 2004
Authored by Enrico Kern | Site h07.org

AntiExploit is a small Perl script that scans for well known exploit files. It currently recognizes over 1400 suspicious files, and the database is updated weekly. Useful for a system that has a lot of shell accounts being used.

tags | shell, perl
systems | unix
SHA-256 | d48cf9228975b741d91369068db09a6363848e7d8ab3e3e9f5c5d93298a5ed12
jailed-1.0.0.tar.gz
Posted May 1, 2004
Authored by Johan Lindh | Site sourceforge.net

jailed implements a non-privileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child. Tested on OpenBSD and Gentoo Linux.

systems | linux, unix, openbsd, gentoo
SHA-256 | f1ffa44fc4b1cace7bef9c2fbacba49de070e0b0151a188fd8751869bcb32405
hap-linux-2.2.26-1.diff
Posted May 1, 2004
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: This release has been synchronized with kernel 2.2.26 and Openwall 2.2.26-ow1.
tags | root, patch
systems | linux, unix
SHA-256 | b56be54ffa14a72c217268c5e8fbef7e7d5ef5c7b7e401d0e35686b428f6ffd2
callds.c
Posted May 1, 2004

MS04-011 DsRoleUpgradeDownlevelServer remote exploit. Submitted anonymously.

tags | exploit, remote
SHA-256 | c345e1ceaf031691148d79a9fafffd9b68fdbe6f2ffeb4b7ad70da3edd68b5fe
mplayerRTSP.html
Posted May 1, 2004
Site mplayerhq.hu

Multiple vulnerabilities have been discovered and fixed in the Real-Time Streaming Protocol (RTSP). Versions of MPlayer below 1.0pre4 are affected.

tags | advisory, vulnerability, protocol
SHA-256 | f42371e900636bbb672e0c3661765f1b16d179f412ab731b1a2740d47ec26398
04252004.ms04011lsass.c
Posted May 1, 2004
Authored by sbaa

Remote exploit for the Lsasrv.dll RPC buffer overflow. To make this exploit work remotely you have to use the sbaaNetapi.dll which modifies the DsRoleUpgradeDownlevelServer API.

tags | exploit, remote, overflow
SHA-256 | c155fee77b812701dd4efb98b8ad352943a5fa4ca64edab679c6ddefca7a2e45
HOD-ms04011-lsasrv-expl.c
Posted May 1, 2004
Authored by houseofdabus

Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server.

tags | exploit, remote, overflow
systems | windows
SHA-256 | b67594dc0860e55e0a2dbb1361ffe68073b8564d93f740595e75b36e19a82e49
hsftpexpl.tgz
Posted May 1, 2004
Authored by priestmaster | Site priestmaster.org

HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.

tags | exploit, remote
SHA-256 | 0f0b1134f526e9e119a43dac0a36550ab2c1495e9c627acdb6f4557b53503898
hydra-4.0-palm.zip
Posted May 1, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Palm binary version released.
tags | web, cracker, imap
systems | cisco
SHA-256 | 9970185af51e16c9801f755a5b8516a7c8fca1ae5ec372cee96f42fca2aa2424
repredhat.txt
Posted May 1, 2004
Authored by BlackAngels | Site blackangels.it

A local buffer overflow vulnerability exists in REP version 0.15.1 on RedHat Linux 7.3. Proof of concept exploitation included.

tags | advisory, overflow, local, proof of concept
systems | linux, redhat
SHA-256 | 8e1fdc0cc3c3bec4177fbfd6ba811f0eac0e4c1f712dacde188c47bea51db84c
Cisco Global Exploiter
Posted May 1, 2004
Authored by Nemesis, BlackAngels, E4m | Site blackangels.it

Cisco Global Exploiter is a tool that demonstrates exploitation of the various Cisco buffer overflow and denial of service vulnerabilities. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, remote, web, denial of service, overflow, arbitrary, protocol, memory leak, bypass
systems | cisco, windows
SHA-256 | d9ebaf0cd3d01a7813e46a67bf12eaee98841234ed430e3ca3ae69831f7dfb62
hst.tar.gz
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Scanner for webservers that checks for various CGI and other httpd related vulnerabilities.

tags | cgi, vulnerability
SHA-256 | 0860f49a686ecc423f54a9627ebbb8e9687d063d2d2dba9f40aa4740b438ce32
lboeg.pl.txt
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.

tags | overflow, local
systems | linux, irix, bsd, hpux, unixware
SHA-256 | 465a904f656b98cb00d6dfdb5da54526aa940319ba0406a0fa7caa938bc9a2a9
plem.tar.gz
Posted May 1, 2004
Authored by BlackAngels | Site blackangels.it

Perl Loadable Exploiting Module (PLEM) is an advanced module for Perl programming that provides a list of common functions for local and remote exploit coding.

tags | remote, local, perl
SHA-256 | 59990e1585e8a43db707953bdaf4a443fe2cfb007fbeb1b8f7770a1e56900e07
Microsoft Windows LSASS Buffer Overrun
Posted May 1, 2004
Authored by OCANOR

Microsoft Windows LSASS (Local Security Authority Subsystem Service) is prone to a remotely exploitable buffer overrun vulnerability. The specific vulnerable system component is LSASRV.DLL. Successful exploitation of this issue could allow a remote attacker to execute malicious code on a vulnerable system, resulting in full system compromise. This exploit produces a shell.

tags | exploit, remote, overflow, shell, local
systems | windows
SHA-256 | 3028a82b21c514fb8370c4391a58a4050e0b3aa2d874a827f1748ed35a4edee8
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close