exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 97 RSS Feed

Files Date: 2003-06-01 to 2003-06-30

wmediaremote.txt
Posted Jun 29, 2003
Authored by Brett Moore SA | Site security-assessment.com

Windows Media Services Remote Command Execution - There is a flaw in the way nsiislog.dll processes incoming client requests. A vulnerability exists because an attacker could send specially formed HTTP request to the server that could cause IIS to fail or execute code on the system.

tags | advisory, remote, web
systems | windows
SHA-256 | 8f2e5764c182b67bd6e0097fd3e00391b5ccda2203e5742a4792b474ff7bf79c
secuniaFTP.txt
Posted Jun 29, 2003
Authored by Carsten Eiram | Site secunia.com

Secunia Security Advisory - The FTPServer/X FTP Server Control and COM Object v1.00.045 and v1.00.046 are vulnerable to buffer overflow that results in a denial of service and potentially can enable a remote attacker to gain access to the machine.

tags | exploit, remote, denial of service, overflow
SHA-256 | 0894d97443bbd9d1990dddc0a475b12dff29aa463f6dba9d9b9afdabb6b001cc
DominoHunter-0.9.zip
Posted Jun 29, 2003
Authored by Pierre CARON

Domino Hunter is a Lotus Domino web server scanner, written in Perl. It attempts to access default NSF databases, as well as crawl user-defined bases. It tries to enumerate the database structure, enumerate available views, available documents, and ACLs set on documents. It also tries to retrieve documents from available views in order to check if ACLs are correctly set to restrict documents and not views. The scanner works in both anonymous mode or privileged mode if user supplied credentials are supplied to then be passed to the default names.nsf/?Login form.

tags | tool, web, scanner, perl
systems | unix
SHA-256 | a0dfd46a268e0ea58831d6951b8066279b3994e491c0e59ca18d96facd2a8f2d
linux86-udpcode.c
Posted Jun 29, 2003
Authored by Gunzip | Site members.xoom.it

Linux x86 UDP shellcode. Reads from UDP port 13330 to retrieve other shellcode then executes it.

tags | x86, udp, shellcode
systems | linux
SHA-256 | a19f2e0f5e3ed7c024fa5903d3b63b3001cc6d694f0a752097064021a0cea265
openbsdportscan.txt
Posted Jun 29, 2003
Authored by STE Jones | Site networkpenetration.com

By using the OpenBSD packet filter pf, one can utilize the NAT address pools added into OpenBSD 3.3 to aid in distributed port scanning.

tags | tool, scanner
systems | unix, openbsd
SHA-256 | 8a31bcc028af2e38e08d090044b50741b4a83069781ec6191a41a5c751b115ab
art_of_brute_forcing.txt
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Paper written about the art of brute force cracking that comes with example code.

tags | paper
SHA-256 | 45d8ad1042d40237b9961db4391407e13922af227ab3c00955c625e2a4c5e4fe
dirtybrute.zip
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Dirtybrute is an advanced multi threaded program that demonstrates the use of a brute force engine which has many options such as the ability to resume cracking sessions for both brute force mode and dictionary attacks. Currently supports remote MSN messenger cracking sessions.

tags | remote, cracker
SHA-256 | 1b5eceb2e1ded79867017fb83a6a76c1bc79c59c0d801c3e6d36725f611ed767
winrpcnuke-nix.c
Posted Jun 29, 2003
Authored by Lion | Site cnhonker.com

Microsoft Windows RPC Denial of Service utility.

tags | denial of service
systems | windows
SHA-256 | ae0ee9bbf31e25b6679761ba4234641251fc289657530f1fce259256e3665fdc
DSR-geekrellm-linux.pl
Posted Jun 29, 2003
Authored by Knud Erik Hojgaard

Gkrellmd 2.1.10 remote exploit with shellcode that does kill(-1,9) then an exit. Written for Linux and tested on Slackware 9.

tags | exploit, remote, shellcode
systems | linux, slackware
SHA-256 | b973bd4af33c09c485c0b63186d2856b6559db115187b42032801bdb8afede57
login_hacker-1.1.tar.gz
Posted Jun 29, 2003
Authored by van Hauser, thc | Site thc.org

THC Modem Login Hacker - A tool that will attempt to break into modem dialups using scripts written for minicom. Extremely configurable and a must have for any penetration test.

SHA-256 | 828570b792839f01260c13d3a4c84290f8ec66299dfceef31ab46fc2941ec452
gkrhack0x03.c.gz
Posted Jun 29, 2003
Authored by r-code

gkrellmd < 2.1.12 remote exploit for Linux. Tested against Debian 3.0 with version 2.1.4.

tags | exploit, remote
systems | linux, debian
SHA-256 | aa8ce6fe14ecc2b660ceedf693cf2c3029daf366800f5723d6ca812b4e943aac
suiddmp.c
Posted Jun 28, 2003
Authored by IhaQueR

Local root exploit that makes use of a race condition vulnerability found in the Linux execve() system call that affects the 2.4 kernel tree.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | c02c2f58cf3b035c346097edc9de2f0459979689331100ce6b90e71e1f58d4b2
heap_off_by_one.txt
Posted Jun 25, 2003
Authored by qitest1 | Site bespin.org

A short paper discussing exploitation of vulnerabilities consisting of a null byte written passed the end of a dynamically allocated buffer.

tags | paper, vulnerability
SHA-256 | 0e1f36dccb0e9ef58428ac810760e9e766e92f7934ec298303105f871f0ca1b2
NGSwebadmin.txt
Posted Jun 25, 2003
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2406-03 - WebAdmin.exe, a utility that allows remote administrators to control MDaemon, RelayFax, and WorldClient, has a remotely exploitable buffer overrun in the USER parameter that would allow a remote attacker to execute arbitrary code on the server.

tags | advisory, remote, overflow, arbitrary
SHA-256 | 6792c533a2cd9f5fcacddb71b75e2176618d3457d31728ba0246ae3dfa98eb02
HexView Security Advisory 2003-06-07.01
Posted Jun 25, 2003
Authored by HexView, SGI Security | Site sgi.com

SGI Security Advisory 20030607-01-P - Several bugs in the IRIX 6.5.19 implementation of IPv6 result in inetd becoming hung when port scanned, snoop unable to handle packets as root, and other non-security related issues.

tags | advisory, root
systems | irix
SHA-256 | 0fdaa24f936f93dd53593bf93d40a3969220454aeead17be748bfea6c4c28e2d
kerio563.txt
Posted Jun 25, 2003
Authored by B-r00t

Kerio Mail Server 5.6.3 remote buffer overflow exploit. Adds wide open root account to /etc/passwd. Written based upon the vulnerability discussed here.

tags | exploit, remote, overflow, root
SHA-256 | 9b6caaf215dc0b765ded6013c36c55a7897e80b242d716bc226a4ac4ccb0eef0
icopy.tgz
Posted Jun 25, 2003
Authored by xenion | Site xenion.antifork.org

This utility provides a datalink bridge working in userspace that allows captured packets from one ethernet interface to be retransmitted over a non-ethernet interface.

tags | tool, sniffer
SHA-256 | 355b995aacd7f973a646ba0ca1367d3513bf89b8f6e5d75ad0b770fab636891b
DSR-geekrellm.pl
Posted Jun 24, 2003
Authored by Knud Erik Hojgaard

Gkrellmd 2.1.10 remote exploit with connect back shellcode. Tested on FreeBSD 4.8.

tags | exploit, remote, shellcode
systems | freebsd
SHA-256 | 0484a62c7b78dd555a7a6f5e4945f1aa3126597a6351fbe10cbc505dfc097213
honeyd-0.6.tar.gz
Posted Jun 24, 2003
Authored by Niels Provos | Site citi.umich.edu

Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Changes: This release includes faster routing lookups, asymmetric routing, GRE tunneling, plugins and configuration systems, integration of physical machines into the virtual routing topology for network simulation, performance improvements, and several bugfixes.
tags | tool, arbitrary, tcp, intrusion detection
systems | unix
SHA-256 | a4283aa083febb3f02e3df99d29842a8d03014ddc9e4831fde0b5d9756b51852
SRT2003-06-20-1232.txt
Posted Jun 24, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-06-20-123 - The Progress 4GL Compiler version 9.1D06 and below has a datatype buffer overflow that can be exploited if a malicious .p file is compiled. Both the Win32 and Unix variants are affected by this.

tags | advisory, overflow
systems | windows, unix
SHA-256 | 22d12cc34b522d69526bd9f24df1b3f06220ba1e69d4b24bfbecb9b39aa132ba
kereval.tutos.txt
Posted Jun 24, 2003
Authored by Francois SORIN | Site kereval.com

Kereval Security Advisory KSA-001 - Cross Site Scripting vulnerabilities exist in Tutos 1.1 allow for hostile code execution.

tags | exploit, vulnerability, code execution, xss
SHA-256 | e7b4573c8bb5f2819b9bdd4a50ae12f65f581d9ffbff39d67207d7b923bf4d76
DSR-korean-elm.pl
Posted Jun 24, 2003
Authored by dsr, Knud Erik Hojgaard

Exploit for Elm version ko-elm-2.4h4.1, the Korean release, that yields gid of bin. Old vulnerability related to this is here. Tested against FreeBSD 4.7.

tags | exploit
systems | freebsd
SHA-256 | bdb62d798a58f673dc7a74bf9554a3a89281cc32e003b0963dceb3f6d801b45a
widsard-0.1.tar.gz
Posted Jun 24, 2003
Authored by Davide Fais, Stefano Frassi, Filippo Giuntini, Luca Pugliese | Site widsards.sourceforge.net

wIDSard is a host-based Intrusion Detection System for i386 Linux platform. It intercepts, at user level, system calls specified in a configuration file written by the user. A finite-state automater is used to trace the monitored process. The language used for the configuration file is regular expression based. If a particular sequence of system calls is intercepted than an appropriate action could be executed.

tags | tool, intrusion detection
systems | linux, unix
SHA-256 | 0cf3f6b335746b3adfb3ac04a614f5cce00de12cd079dba7fdab54432d3b6bc5
apsr-0.17.tar.gz
Posted Jun 24, 2003
Authored by Maik Pfeil, Martin Kluge, Patrick Kaiser | Site aa-security.de

The APSR project is a network testing suite, designed to send, receive and analyze arbitrary network packets on different kinds of networks. It can be used to test firewalls, routing, security and many other networking functionalities. The main goal of the APSR project is to develop a high quality network testing suite.

tags | tool, arbitrary
systems | unix
SHA-256 | 78d668adfaebfd7ef51ec22c5960441fe48ccc804d4c5fa56d78186bf8de0e20
snacktime.tgz
Posted Jun 24, 2003
Authored by Tod Beardsley | Site planb-security.net

Remote OS fingerprinting tool written in Perl that analyzes the retransmission timeout lengths of a TCP handshake to detect remote operating systems.

tags | tool, remote, scanner, perl, tcp
systems | unix
SHA-256 | dc7fea5649186770394de79bc8fc28fa6fed9514e07f2a48476faa5d4e2dd950
Page 1 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close