exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 44 of 44 RSS Feed

Files Date: 2000-09-13 to 2000-09-14

rovikingxploit.c
Posted Sep 13, 2000
Authored by WC

Robotex Viking Server 1.0.6 Build 355 and prior for Windows 95 and NT remote buffer overflow exploit. Binds a shell to a port.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | e22c42e753f4fa08366620f23765653b64d03ab67ef2ecf8a07e490cb488a968
mobiusdocdix.c
Posted Sep 13, 2000
Authored by WC

Mobius DocumentDirect for the Internet 1.2 remote exploit. Binds a shell to a port.

tags | exploit, remote, shell
SHA-256 | ce3a7e218bb9fb62db69535c606419166b381ba3fb2b77281d56bfcfa40b2ec3
winweb.c
Posted Sep 13, 2000
Authored by Castrol

winweb.c exploits the con/con bug to crash the Windows 98 webserver.

tags | exploit
systems | windows
SHA-256 | 42584c180cce08a8d254181bae9d44970c79fd6e8553a0c736cada948efb67aa
access-counter.pl
Posted Sep 13, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

The popular CGI web page access counter version 4.0.7 by George Burgyan allows execution of arbitrary commands due to unchecked user input. Commands are executed with the same privilege as the web server.

tags | web, arbitrary, cgi
SHA-256 | e0a35b69e4f5aef2395340390b513acaf3525217945eb4350d781f82b87e195f
bland.c
Posted Sep 13, 2000
Authored by Mike Frantzen | Site msg.net

bland.c exploits a bug in Guantlet 5.0 which causes the firewall to hang when an invalid ICMP packet is sent to a machine which is forwarded through the firewall.

tags | exploit
SHA-256 | 09a5c8c71232fd537a6add6c81e27e690a0d7c6674e8c844053c608c81e84ec0
fp-ext-dos.sh
Posted Sep 13, 2000
Authored by Wouter ter Maat | Site grazer.gz.ee

Frontpage Server Extension shtml.exe denial of service attack. Based on an advisory by www.xato.net. Vulnerable systems include Microsoft Windows 95, 98, NT 4.0 and NT 2000.

tags | exploit, denial of service
systems | windows
SHA-256 | 43d752f3668ac471fb7f9b5cda917b5b2b09dc06934f38381a453cd6dfb342d1
lpset.pl
Posted Sep 13, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

Perl port of the /usr/bin/lpset local root vulnerability in Solaris/SPARC 2.7. Based on lpset.sh.

tags | local, root, perl
systems | solaris
SHA-256 | d7a3671db5103886a50d238f176908dbdf003c5e30c4ebc5ea6fba725fccf9ac
zgv-exploit.c
Posted Sep 13, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

Zgv 3.0 local exploit for Linux.

tags | exploit, local
systems | linux
SHA-256 | 97a09fdb60023de0734f695a952ce7ceec2f4651602772ae2bbd81286136ebe7
rumple.tgz
Posted Sep 13, 2000
Authored by Nimrood

rumple.tgz exploits the recent ld.so unsetenv vulnerability in Caldera Openlinux.

tags | exploit
SHA-256 | 56c493b400141689b410dc981464badb4d7008167d902e6412e0e9cce077ac82
icqrinfo-12.zip
Posted Sep 13, 2000
Authored by Moritz Bartl | Site headstrong.de

Icqrinfo is a Windows program which reads information (including passwords, personal information, and deleted contact list information) stored in ICQ.DAT files. ICQ Versions 99a, 99b and 2000a are supported.

Changes: Full support for ICQ 2000a and many bugfixes.
systems | windows
SHA-256 | 8f2a33272fe006de0ed39091f243022ea4e6c03d16e5b61d79a53daaea4f6c26
boscanx.c
Posted Sep 13, 2000
Authored by Nijen Rode

boscanx.c is a fast back orifice scanner that accurately records infected ip addresses while spoofing it's source ip.

tags | tool, scanner, spoof
systems | unix
SHA-256 | 452ad5deb832c601076e6bd1e55e97e73bef0dd6fe6b2cf98d58295635009db0
kamikaze.c
Posted Sep 13, 2000
Authored by Interstellar Overdrive

Kamikaze.c is a simple and small HTTP scanning tool. It is customizable and takes its input from a config file.

tags | web, cgi
systems | unix
SHA-256 | 418b784fdf1e8834347be67c80131df8757d6d3619bb44e0d0ac705c7f0d9aab
banner.c
Posted Sep 13, 2000
Authored by Cyber_Bob

Banner.c v1.0 is an improved banner grabber - It is faster then existing banner grabbers, and compiles on many platforms. Features the ability to scan a rage of hosts and check for keywords in the banners.

tags | tool, scanner
systems | unix
SHA-256 | 6f2a3939d08b85df19a5b8dbd9591c1a7cf6926be6d6cea1da55c9a0b63806af
eject.locale.c
Posted Sep 13, 2000
Authored by Warning3 | Site nsfocus.com

Solaris 2.x locale exploit - exploits /usr/bin/msgfmt and /usr/bin/eject locale format bug for local root access.

tags | exploit, local, root
systems | solaris
SHA-256 | 88937ded48954c3ed21f78a4d769f8190c43fa9f3802825fa180b88ccb18bec4
NTMap.exe
Posted Sep 13, 2000
Site dansa-network.net

Enhanced NT PortMapper is an NT port scanner which is low on CPU usage. Needs ActiveX Suite and the uptodate Main OCX's.

tags | activex
SHA-256 | 0744162548098212aa21bdaddc4433733af72d6f801e354965c1f651fd6626e6
sifi-0.1.6.tar.gz
Posted Sep 13, 2000
Authored by Marcello Scacchetti | Site sinusfirewall.org

The SINUS firewall is a free and easy way to protect your network from the daily threats of the Internet. Features filtering of all header fields in the IP,TCP,UDP,ICMP,IGMP packets, intelligent RIP and FTP support, easy to understand, text-based configuration, graphical management interface for configuration of several firewalls, dynamic rules, including counters and time-outs, extensive logging, alerting, and counter intelligence, and prevention of packet and address spoofing. Works with the linux 2.2.x kernels.

Changes: A new feature called "udp stream" was added. It allows consecutive UDP packets to be logged only once. Additionally, some bugs have been fixed.
tags | tool, kernel, udp, spoof, tcp, firewall
systems | linux, unix
SHA-256 | 9062ae57bbc5e0e42afb75ab6904c209fdf42ca438fbf98375b55aca0021fbc5
pdump-0.779-2.tar.gz
Posted Sep 13, 2000
Authored by Samy Kamkar | Site pdump.lucidx.com

Pdump is a sniffer written in perl which dumps, greps, monitors, creates, and modifies traffic on a network. It combines features from tcpdump, ngrep, tcptrace, dsniff (and its webspy and urlsnarf), pfilt, macof, and xpy. It understands tcpdump-like syntax and allows easy modifications via a plug-in system. Readme available here.

Changes: Sniffed TCP packets now display the sequence number as tcpdump would do, and the "empty packet" bug with the ngrep-clone option has been fixed. Fixes for a few systems regarding unused perl modules have been included.
tags | tool, perl, sniffer
SHA-256 | 3fb40f2bd523eecdd833e0166a9a1ce515da621cdc8a19adf3910f19c324c883
horde-imp.txt
Posted Sep 13, 2000
Authored by Christian Winter

The IMP-2.2.0 webmail interface contains a bug in the the library file "horde.lib" which allows commands to be executed under the UID which the webserver runs as. Exploit information included. Patch available here.

tags | exploit
SHA-256 | 5cd37cea6ed0bf632564427031d816598d01b2a66f0f2101fca4af6f7600bec3
sendip-1.0.tar.gz
Posted Sep 13, 2000
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: This release compiles under *BSD as well as Linux, doesn't need GNU make, and includes RPMs and random header field generation.
tags | tool, arbitrary, udp, tcp
systems | unix
SHA-256 | 2748312b313f51fe98b7da120c65ca331259ea7c7fb5d8b7f43a0d4d0d7a75c4
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close