exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files Date: 2002-04-02 to 2002-04-03

icx.c
Posted Apr 2, 2002
Authored by Bab Boon

Icecast v1.3.11 and below remote root exploit for linux/x86. Binds a shell to port 30464. Tested against SuSE 7.2, Debian 2.2r2, and Slackware 8.0.

tags | exploit, remote, shell, x86, root
systems | linux, suse, slackware, debian
SHA-256 | 15679ffcee48c2b319d6b32319e3a3603c8e5e5f6e3e6fdca3e63eba9856f9bd
Nmap Scanning Utility 2.54 BETA 32
Posted Apr 2, 2002
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Several error-checking statements, Windows compilation bugs and Windows 'ping' related bugs are fixed in this version.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | d2c931697ff437702bbef99e8c9ece89a1d5a88dc1d8a62e4cbbfe17a461e9df
sgen.c
Posted Apr 2, 2002
Authored by Dim

Sgen.c compiles shellcodes from NASM source. Tested on FreeBSD and Linux but should work with most unix systems with nasm.

tags | shellcode
systems | linux, unix, freebsd
SHA-256 | 59145c1fb9f5ad12082aef3bc64ec2987ecea9d3d588ac3f3dbb985673b42f3b
0203-exploits.tgz
Posted Apr 2, 2002
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for March, 2002.

tags | exploit
SHA-256 | 32475286918ca0aba5a1307b2df67c47c918182791f3ca69d42db7bd97b909e7
guninski-53.txt
Posted Apr 2, 2002
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #53, 2002 - Two serious security vulnerabilities have been found in Microsoft Office XP. It is possible to embed active content (object + script) in HTML mail which is triggered if the user replies to or forwards mail. In addition, a bug in the Host() function of the spreadsheet allows creating files with arbitrary names and their content may be specified to some extent at which is sufficient to place an executable file (.hta) in user's startup directory which may lead to taking full control over user's computer.

tags | exploit, arbitrary, vulnerability
SHA-256 | 3f49c6b96bb45bdcb1c169996f326348feabd1e79660329b74273529af5b2f1f
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close