what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 134 RSS Feed

Files Date: 2003-04-01 to 2003-04-30

0x82-Remote.XxxxBSD_passlogd.xpl.c
Posted Apr 10, 2003
Authored by Xpl017Elz | Site inetcop.org

Remote exploit for the buffer overrun found in passlogd on FreeBSD and OpenBSD. Tested against OpenBSD 3.0 and FreeBSD 4.6.2.

tags | exploit, remote, overflow
systems | freebsd, openbsd
SHA-256 | 2d99af360fcfbd0f1ef67c210707772b3603b3c56e48592f450d174014eaef3f
win32sc.h
Posted Apr 10, 2003
Authored by TianXing | Site tianxing.org

Win32 Shellcode Version 1.1 - Supports SHE+ScanMem to get GetProcAddress memory address, bind mode, connect back mode, reuse connect mode, and more.

tags | shellcode
systems | windows
SHA-256 | 5362ba1b4b205e3dbeaca2371bc7f6813b413007491740ae688a645399986d60
goons.sh
Posted Apr 10, 2003
Authored by xenion | Site antifork.org

Simple scripting utility that will perform DNS, SMTP, and HTTP scans on a hostname list given by google.com.

tags | tool, web, scanner
systems | unix
SHA-256 | 22496f05022cb6837ddc642bb6b9592199c3824b3664014e3f379c9af03ac571
Apache 2.x Memory Leak
Posted Apr 9, 2003
Authored by Matthew Murphy

Apache 2.x memory leak proof of concept exploit.

tags | exploit, proof of concept, memory leak
SHA-256 | d4fbe74bb18c6e0f994d19cdb1e82f8a0689fa3ca218b404294e09b094809d44
UDPRemoteControls.txt
Posted Apr 6, 2003
Authored by Angelo Rosiello, rosiello

This paper illustrates how to control server with the UDP protocol. It covers UDP basics, how to spoof datagrams, and gives full source code with explanations. This paper can be used in conjunction with the udp-remote-final.tar.gz package.

tags | paper, remote, udp, spoof, protocol
SHA-256 | 3416eee186ecb4a1c7798816bcd5868bc05378accefdc3c5557d1a4fbc71a12a
wIDS-1.4.3.tar.gz
Posted Apr 6, 2003
Authored by numero six

wIDS is a wireless IDS. It detects management frames jamming and could be used as a wireless honeypot. Data frames can also be decrypted on the fly and re-injected onto another device.

tags | tool, wireless
SHA-256 | 86aeaba8b21c9e2972c6eeea1d86984de96b31f6dcc06a647127c61c9e5d08d4
ath0.c
Posted Apr 5, 2003
Authored by Cyber Bob

This script uses the linux ping command to simulate the +++ATH0 bug represented in modems that have thier gaurd time set low. Consider this a version of gin.c that actually works... but it is also more efficient in a way because of the emplementation of "ping".

tags | denial of service
systems | linux
SHA-256 | ad188dd1d0e4912673cdad5d3b3e4fa6f80962690fec38012d2b615413e7a23f
stuff.c
Posted Apr 5, 2003
Authored by Cyber Bob

stuff.c v1.0 sends an illegal character for ppp frames, causing a packet of double size to be returned.

tags | denial of service
SHA-256 | 6ffa52818243eca9d792e090449bb997f9a1f740b3ebe0cc9d96ca1ad2c40abf
stegtunnel-0.2.tar.gz
Posted Apr 5, 2003
Authored by Todd MacDermid | Site synacklabs.net

Stegtunnel is a tool written to hide data within TCP/IP header fields. It was designed to be undetectable, even by people familiar with the tool. It can hide the data underneath real TCP connections, using real, unmodified clients and servers to provide the TCP conversation. In this way, detection of odd-looking sessions is avoided. It provides covert channels in the sequence numbers and IPIDs of TCP connections.

tags | encryption, tcp, steganography
SHA-256 | ebef4d7fb76c4d35e30fe24a2260a12237b058adad112fa1c746f7a0277b289c
regexploit.c
Posted Apr 5, 2003
Authored by ThreaT | Site chez.com

Local exploit/trojan that makes use of REGEDIT.EXE. Any file containing a value of more than 260 characters causes an error exception by the RegSetValueExW function, which then uses a function of NTDLL.DLL which is vulnerable.

tags | exploit, local, trojan
SHA-256 | c874fde4ec04f62e0bde41e571ba6761e1c46629f665638a2753eb90b45c1471
OpenFuckV2.c
Posted Apr 5, 2003
Authored by SPAX | Site spabam.tk

Remote exploit for Apache + OpenSSL v0.9.6d and below. This exploit is based upon the openssl-too-open exploit by Solar Eclipse and offers more than 130 targets including various flavors of Linux. Updates: More targets have been added and this version of the exploit also attempts to download the ptrace exploit, compile, and execute it in an attempt to gain root privileges.

tags | exploit, remote, root
systems | linux
SHA-256 | a47755378b773f335a74bb7a4b40dcd8af408322961e6a3c7e5252d068998e50
yabbse.pl
Posted Apr 5, 2003
Authored by SPAX

Yabase v1.5.0 remote exploit to spawn bash shell with Apache uid.

tags | exploit, remote, shell, bash
SHA-256 | 58656cc32a0af4370be32b024340a8b698195d4cb03ac29dfab328c01e3fb61e
abyss.txt
Posted Apr 5, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Abyss Web Server v1.1.2 and below has a denial of service vulnerability where the server can be crashed remotely via uncompleted fields.

tags | exploit, web, denial of service
SHA-256 | d86a3e89daf4e0b1c43cb68523417f0347659320ea71449cfdd0694782755813
xlock-XLOCALEDIR.c
Posted Apr 5, 2003
Authored by Omega

Local root exploit utilizing the overflow in XLOCALEDIR under XFree86 Version 4.2.x using xlock. Written to work on Redhat 7.2.

tags | exploit, overflow, local, root
systems | linux, redhat
SHA-256 | 4f06feb2008a323c9ee1ec5fc10c12fb0db7abdec79524c84490367295d8d227
SRT2003-04-04-1106.txt
Posted Apr 5, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations Advisory 1106 - The AOLServer Proxy Daemon API contains exploitable syslog() calls in nspd/libnspd.a. This vulnerability is remotely exploitable.

tags | advisory
SHA-256 | 68e25eb097cfab06cdbd23579c0aa94b2ed828355e93606d120a274ab998f1fe
x25zine3_rus.zip
Posted Apr 4, 2003
Authored by madcr, free hunter, gkcj, x25 | Site x25zine.org

x25zine number 3 - Topics discussed: m68k shellcodes for Linux, Parrot assembler, OpenVMS, Amiga viruses, /dev/* patching on Linux, Digital Unix, and more. Russian version.

tags | shellcode, magazine
systems | linux, unix
SHA-256 | 74fe62eea3f1b299d43181bdd6dcf0e3cff89b33c6e6195dbea4b731daf413af
x25zine3_eng.zip
Posted Apr 4, 2003
Authored by madcr, free hunter, gkcj, x25 | Site x25zine.org

x25zine number 3 - Topics discussed: m68k shellcodes for Linux, Parrot assembler, OpenVMS, Amiga viruses, /dev/* patching on Linux, Digital Unix, and more. English version.

tags | shellcode, magazine
systems | linux, unix
SHA-256 | ecb7dfec3f6018b5a52dcde53ee97cc2ff50a23b8e15afe4d9ca72fbec76844a
nessus-2.0.3.tar.gz
Posted Apr 4, 2003
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: Fixed a compilation issue which would prevent find_services.nes from working, Includes a NASL port of smtpscan, rewrote webmirror.nasl, added checks for older Microsoft Advisories, SMB plugins now use NTMLv1 authentication, and added Added NTLMv2 authentication.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 27cf453511aebcc96cff5118d614b1c155dd0610d31545b1f370533a705182aa
iehist-src-0_0_1.zip
Posted Apr 3, 2003
Authored by Patrik Karlsson | Site cqure.net

IEHist dumps Internet Explorer history from index.dat files into delimited files suitable for import into other tools.

SHA-256 | b8aa5e9a301292fd275a632be35c3791be8407e584979256137f32203de3a450
vncpwdump-src-1_0_0.zip
Posted Apr 3, 2003
Authored by Patrik Karlsson | Site cqure.net

VNCPwdump can be used to dump and decrypt the registry key containing the encrypted VNC password in a few different ways. It supports dumping and decrypting the password by: Dumping the current users registry key, retrieving it from a NTUSER.DAT file, decrypting a command line supplied encrypted password, and injecting the VNC process and dumping the owner's password.

tags | cracker, registry
SHA-256 | ebf49f069d3620f60c4c84681dfca3061ff616033ee023578474e84bc7623eed
passifist_src_1.0.0.tgz
Posted Apr 3, 2003
Authored by Patrik Karlsson | Site cqure.net

Passifist is a tool for passive network discovery. It could be used for a number of different things, but was mainly written to discover hosts without actively probing a network. The tool analyzes broadcast traffic and has a plugin architecture through which it dissects and reports services found. Initial version holds support for the following protocols and plugins: CDP, CIM, HSRP, IPX, NETOP, SMB, TFTP.

tags | tool, sniffer, protocol
SHA-256 | 8bc5231456824abbfdbf91481823c7a14a7be0f5e42fc530de99aeb9ac3314bb
safemode-adv-chitext.txt
Posted Apr 3, 2003
Authored by Zillion | Site safemode.org

ChiTeX, the utility used to put Chinese Big5 codes in TeX/LaTeX documents, contains two setuid root binaries that execute cat without using an explicit path allowing an attacker to easily gain root privileges.

tags | exploit, root
SHA-256 | 1c2236c651538e4aaaa0b8f89bbc85cd212f6cf79eed7e9609ddef1998071e56
0x82-Remote.passlogd_sniff.xpl.c
Posted Apr 3, 2003
Authored by Xpl017Elz | Site inetcop.org

Remote exploit for the buffer overrun found in passlogd. Target list includes four flavors of Linux with more to come.

tags | exploit, remote, overflow
systems | linux
SHA-256 | 37b269945b84e22d48de5f5d785c67d39f7bf09b5346f96a621bc6647022fc26
sbfprint.txt
Posted Apr 3, 2003
Authored by Necrose | Site truncode.org

Service Banner Fingerprinting in C - This paper is a supplement to modular's tcpscan series. It covers how to write C programs that will perform banner fingerprinting using various standard servers as examples.

tags | paper
SHA-256 | e235c26539ac8a622e503b130f1fea2dec6c57ae8c0f9b6cd3ed0564bfe69c95
mtrewt.c
Posted Apr 3, 2003

Local root exploit for mtr versions lower than 4.0.6. Vulnerability originally found by KF of Snosoft.

tags | exploit, local, root
SHA-256 | d8abcbb929ad05dfb21ec534c2ad715d568011e3df645bbfcfb8825327e5eb29
Page 4 of 6
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close