exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2002-09-06 to 2002-09-07

msnmsgpwd.exe.zip
Posted Sep 6, 2002
Authored by Obscure | Site perl.ob5cure.com

Windows ActivePerl executable which proves the encryption being used by MSN Messenger v4.6 is weak by doing a base64 decode of a registry key.

tags | cracker, registry
systems | windows
SHA-256 | 6a6a973e993f8a7ff03ce3235b59efe8cdd7c3469f48c8ff0f0558f5d0e6e595
msnmsgpasswd.zip
Posted Sep 6, 2002
Authored by Obscure | Site perl.ob5cure.com

Windows ActivePerl source to a script which proves the encryption being used by MSN Messenger v4.6 is weak. Does a base64 decode of a registry key.

tags | cracker, registry
systems | windows
SHA-256 | 929e758e308384ca9facaf559eabfaecfff3a3dcde3b6450bd6f4b86904d5713
SQLTools Auditing Collection
Posted Sep 6, 2002
Authored by Refdom

SQLTools is a collection of tools for auditing MSSQL servers including SQLScanner,SQLPing, SQLCracker, SQLDOSStorm, and SQLOverflowDos. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, overflow
SHA-256 | 374bca41755cffae37b0cab6cf680d2356195ea96099a393ae6500862971bc6e
shellcode.tgz
Posted Sep 6, 2002
Authored by Claes M. Nyberg | Site cmn.listprojects.darklab.org

Shellcode.tgz contains five Solaris SPARC shellcodes, six FreeBSD shellcodes, and five Linux shellcodes.

tags | shellcode
systems | linux, solaris, freebsd
SHA-256 | 196de7802dae2afa9d1408da23108e3737fc38410fd3d434775778fbd48a2378
upb.admin.txt
Posted Sep 6, 2002
Authored by Hipik | Site hackeri.org

Ultimate PHP Board (UPB) prior to Public Beta v1.0b allows users to gain admin access. Exploit information included.

tags | exploit, php
SHA-256 | c35cf6e4280462e0ca9fbf65fd7ea760784d5113643f85bd3ec2c1e0b0baec4c
bsd-sh.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

BSD x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.

tags | x86, shellcode
systems | bsd
SHA-256 | 5ebf0df299333aa85731a40589283c24601e346f27eb4c85540bbcb350879e59
bsd-bind-sc.c
Posted Sep 6, 2002
Authored by R00T-dude, netric | Site netric.org

150 byte BSD shellcode that binds /bin/sh to tcp port 30464.

tags | tcp, shellcode
systems | bsd
SHA-256 | 46e90d484abaafeadeec0338ba23c502fab10692f9aa3c7a492fd88c113aa870
execve.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

Linux x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.

tags | x86, shellcode
systems | linux
SHA-256 | 6cc8b3b1f1020f760ddff5d729e18b3d55edc7d5fa9c559ca025ce8ea9f1a718
bind-sc.c
Posted Sep 6, 2002
Authored by R00T-dude, netric | Site netric.org

156 byte linux shellcode which binds /bin/sh to tcp port 30464.

tags | tcp, shellcode
systems | linux
SHA-256 | b673fd25cac28c5448d67490da248acb6b14e2332d2e066519529e9e342170a0
afd-expl.c
Posted Sep 6, 2002
Authored by eSDee, netric | Site netric.org

AFD v1.2.14 local root heap overflow exploit. Includes offset for Redhat 7.3 and instructions for finding offsets.

tags | exploit, overflow, local, root
systems | linux, redhat
SHA-256 | ba11ab3a60f47300732402f63f4607eedc8d209f484e0f0110e129539aaa8781
netric-adv008.txt
Posted Sep 6, 2002
Authored by netric, Sacrine | Site netric.org

AFD v1.2.14 and below contains locally exploitable stack and heap overflows. Linux is verified to be vulnerable, other platforms are probably affected.

tags | overflow
systems | linux
SHA-256 | a980ba6ec8ed5d47bd0268e3701acab4f5636c2ef1af109cb0b08737c843510b
Phantasmagoria.tgz
Posted Sep 6, 2002
Authored by Dark Angel

Phantasmagoria hides tasks without modifying syscalls in Linux kernel v2.4. Includes a paper "Smashing The Kernel For Fun And Profit" and proof of concept code.

tags | tool, kernel, rootkit, proof of concept
systems | linux, unix
SHA-256 | 8c94b4a8cb9dab512152346e13f4af60e2f312638d87f9411026459b0fa11add
ms02-050
Posted Sep 6, 2002
Site microsoft.com

Microsoft Security Advisory MS02-050 - Microsoft Windows, Microsoft Office for Mac, Microsoft Internet Explorer for Mac, and Microsoft Outlook Express for Mac is vulnerable to certificate identity spoofing because the CryptoAPI does not check Basic Constraints field.

tags | spoof
systems | windows
SHA-256 | 5a7729e51ebec0efb6b48ada409971e53911b361fad8035cca735a906d62b3b7
local0.c
Posted Sep 6, 2002
Authored by Slacko

Local0.c is a simple linux lkm that denies root access to remote users only. Tested on Redhat 7.2.

tags | remote, root
systems | linux, redhat
SHA-256 | 9cab68c6306efb7370285edcfe37263ff43e1c60ffbdb163f1b701ed962adb51
FS-090502-PCRO
Posted Sep 6, 2002
Authored by Tony Bettini | Site foundstone.com

Foundstone Labs Advisory 090502-PCRO - A remotely exploitable buffer overflow has been found in PGP Corporate Desktop 7.1.1 for Windows 2000 and XP which allows remote code execution and sometimes allows the attacker to find the passphrase of the target user. PGP crashes immediately after the decryption of the malicious file and before the memory containing the passphrase is overwritten. Fix available here.

tags | remote, overflow, code execution
systems | windows
SHA-256 | b85ba0b3f8e2234fe41b2359e1b0e504b243c85b1156adf2448cf464c29aa774
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close