exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2002-12-11 to 2002-12-12

pc-cillin.pl
Posted Dec 11, 2002
Authored by deadbeat

Pc-cillin pop3trap.exe buffer overflow exploit in perl. Return address is off a little making it a denial of service exploit, but could be tweaked to execute shellcode that downloads a trojan.

tags | exploit, denial of service, overflow, trojan, perl, shellcode
SHA-256 | 8243cebd28bc9dc9a0fc4bca0bc3789808f36fb517a6a3f0b81c499438776f38
UC-login.c
Posted Dec 11, 2002
Authored by Mikecc

SunOS 5.6,5.7,5.8 remote /bin/login root exploit which uses the vulnerability described here.

tags | exploit, remote, root
systems | solaris
SHA-256 | 762c482e53fa3ebd68fcb908fb91f3c8ff15e6d084aa07cd2ab6ce4ec51bf980
httpda.pl
Posted Dec 11, 2002
Authored by Crazy Einstein | Site lbyte.void.ru

HTTPda is a perl script that searches a remote site for forms, .cgi and .pl files.

tags | remote, web, cgi, perl
SHA-256 | a3a3bab1e06d96a25c57f97e38cf006c4f87a7a73c39b74655b5d7f80e29a0ea
sendfaild.c
Posted Dec 11, 2002
Authored by Crazy Einstein | Site lbyte.void.ru

Sendmaild.c is a local root exploit for Sendmail on BSD. Exploits the bug discussed in FreeBSD-SA-01:57. Tested on FreeBSD 4.3-RELEASE with Sendmail 8.11.3.

tags | exploit, local, root
systems | freebsd, bsd
SHA-256 | af378464c45ce674f69dcef1b241d4a304679c343fa1f55700fd04fe7f29c324
cgi-explained.doc
Posted Dec 11, 2002
Authored by Gary Brooks

Some information on the Common Gateway Interface (CGI).

tags | paper, web, cgi
SHA-256 | 8b26cd32cbd0a8326977f61fce8ef55d9a9016bc2750bd213be84e63a401d2b0
chatex.c
Posted Dec 11, 2002
Authored by b0f | Site b0f.net

/usr/sbin/chat buffer overflow exploit local exploit. Tested on Redhat 6.2. Chat is not suid by default.

tags | exploit, overflow, local
systems | linux, redhat
SHA-256 | f723fc7663cbe3a0175c84613c487f43811558694a530902e3c7948cc38375a8
libcodict-0.4.tar.gz
Posted Dec 11, 2002
Authored by blh | Site sr-71.nu

Libcodict is a user friendly "combo dictionary" C API developed in order to ease dictionary handling when developing open source security audit tools. Combo dictionaries are a different approach than the traditional plain dictionary with a user list and a list of commonly used passwords. When auditing a server environment, one of the biggest tasks are to remove all default users from old UNIX machines that never got any attention after installation. Using a list of default users and their commonly used passwords is the main idea behind this library.

tags | cracker
systems | unix
SHA-256 | 633c06df61c744d927b6cde6a656b8f6c3da902f8993b3dc83e2cb0553597cd4
idscenter109b22.zip
Posted Dec 11, 2002
Authored by Ueli Kistler | Site packx.net

IDScenter is a free configuration and management GUI for Snort IDS on Windows platform. Features: Snort 1.9 / 1.8 / 1.7 support, Snort service mode support, Snort configuration wizard (Variables, Preprocessor plugins, Output plugins, Rulesets), Ruleset editor (supports all Snort 1.9.1 rule options), AutoBlock plugin support (ISS NetworkICE BlackICE Defender plugin included, Delphi framework too), Alert notification (via e-mail, alarm sound or only visual notification), Test configuration* feature (fast testing of your IDS configuration), Monitoring of up to 10 files and MySQL alert detection (allows centralized monitoring of all Snort sensors), Log rotation* (compressed archiving of log files), Integrated log viewer, Program execution if an attack was detected, and more.

tags | tool, sniffer
systems | windows
SHA-256 | 3a88ed36a87e041f420709ee0d0fae0a1a24a406dd662453951cce94c79db13b
prodos.sh
Posted Dec 11, 2002
Authored by detach | Site duho.org

Proftpd v1.2.7rc3 and below remote denial of service exploit which requires a ftp user account or anonymous access to the ftp daemon. Consumes nearly all memory and alot of CPU. Tested against slackware 8.1 - proftpd 1.2.4 and 1.2.7rc3.

tags | exploit, remote, denial of service
systems | linux, slackware
SHA-256 | b472b47d7f8b3395438de6ee5627449c27fa18d2e9476e8790d13d7b98047093
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close