exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 97 RSS Feed

Files Date: 2003-06-01 to 2003-06-30

amap-2.7.tar.gz
Posted Jun 17, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Added the ability to compile under Cygwin, Added some triggers and responses, and various bug fixes.
tags | tool, protocol
SHA-256 | 94fab83628b9447bc141df6b16c39f31750777f88ee84a8d1eb31ceb8b387221
lednews.txt
Posted Jun 17, 2003
Authored by Gilbert Vilvoorde

LedNews v0.7 lacks any filtering allowing a remote attacker to embed javascript or various HTML tags. It may also be possible to add server side include tags into news posts as well.

tags | exploit, remote, javascript
SHA-256 | bb8bdc61aef9712a1297bda410fd6d68cf2a865fc673e5a6a79779178914d42e
pMachine.txt
Posted Jun 17, 2003
Authored by Frog Man | Site frog-man.org

Pmachine version 2.2.1 has a fault Include() routine that allows a remote attacker to supply a malicious URL that in turn can be a script that the webserver will then execute.

tags | exploit, remote
SHA-256 | 3a954f23f36da44d1a53b9c709a5c45c9eee6bf4b1b93f9c0048194f7b4eb754
iDEFENSE Security Advisory 2003-06-16.t
Posted Jun 17, 2003
Authored by Karol Wiesek, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.16.03: The pam_wheel module of Linux-PAM uses getlogin() in an insecure manner, thereby allowing attackers to bypass certain restrictions. The pam_wheel module is often used with the su command to allow users belonging to a trusted group to utilize the command without supplying a password. The module utilizes the getlogin() function to determine the name of the currently logged in user. This name is then compared against a list of members of a trusted group as specified in the configuration file. If the trust option is enabled in the pam_wheel configuration file and the use_uid option is disabled, any local user may spoof the username returned by getlogin() and gain access to a super-user account without supplying a password.

tags | exploit, local, spoof
systems | linux
SHA-256 | c65f3b99c2e44aca0273c3c270501fa89200aeeec261693c53ac01a45de16c3e
idscenter11rc3.zip
Posted Jun 17, 2003
Authored by Ueli Kistler | Site engagesecurity.com

IDScenter is a control and management front-end for the Windows platform. Main features: Snort 2.0/1.9/1.8/1.7 support, Snort service support, Snort configuration wizard, Rule editor, AutoBlock plugins (Network ICE BlackICE Defender plugin included (Delphi, open-source), Plugin framework for Delphi included), MySQL alert detection & file monitoring, e-mail alerts / alarm sound alerts / visual notification, etc.

Changes: Snort 2.0 Support and more.
tags | tool, sniffer
systems | windows
SHA-256 | f9b7423c7841bf496874eb4b6958f826ddcecd9c8631065cef6dfd7aa797770e
morpheus.c
Posted Jun 17, 2003
Authored by Shashank Pandey

Shellcode that print What is The M4Tr1X ?! and then exits.

tags | shellcode
SHA-256 | 24613700722f04736909af821d62b7e6bc1c78910a71e75776a1e46bce154fb9
5HP0G1FAAC.txt
Posted Jun 17, 2003
Site SecurITeam.com

The product Mailtraq suffers from multiple vulnerabilities that range from access to files that reside outside the bounding HTML root directory through decryption of locally stored password, to a cross site scripting vulnerability in the web mail interface.

tags | exploit, web, root, vulnerability, xss
SHA-256 | 0fccaf9934ee9baa9e271e3755695428f4343300ad90ccad092c5010d7861a0e
wsh-2.0.1.tar.gz
Posted Jun 16, 2003
Site dyatlov.ru

Wsh is a remote UNIX shell that works via HTTP. The client script provides a shell-like prompt, encapsulating user commands into HTTP POST requests and sending them to the server script. The server script extracts and executes commands and returns STDOUT and STDERR output. Features include command line history support, file upload/download, and it can work through an HTTP proxy server.

Changes: SSL Support and new configuration script.
tags | remote, web, shell, file upload
systems | unix
SHA-256 | 7864a855e018dd23e964a0eaf335ca34817663b10989a9550f0bb9e6dff02976
firepass-1.0.2a.tar.gz
Posted Jun 16, 2003
Authored by Alex Dyatlov | Site gray-world.net

Firepass is a tunneling tool that bypasses firewall restrictions and encapsulates data flows inside of HTTP POST requests. TCP or UDP based protocols are supported. Both the client and server entities are written in Perl and the server script acts as a CGI program.

tags | tool, web, cgi, udp, perl, tcp, firewall, protocol
systems | unix
SHA-256 | 6c43de260fd97f1737cc73314eaebbbfd500a970d2214726068a49de4e743123
linux-wb.c
Posted Jun 14, 2003

The ntdll.dll remote exploit through WebDAV that was originally written by kralor. This version is ported to Linux by Dotcom.

tags | exploit, remote
systems | linux
SHA-256 | 2c2a25135d00b80b6afe08a65594cfb418ba630c1c156a70363d9fcc3f00201e
blackicepro.txt
Posted Jun 14, 2003
Authored by Marc Ruef | Site computec.ch

It is possible to evade the BlackICE PC Protection IDS logging of cross site scripting attempts due to a lack of it checking HEAD, PUT, DELETE, and TRACE requests for the <script> pattern.

tags | exploit, xss
SHA-256 | ea50d43db68e3d4aeaaf1d9927e9cd734abfff473651ddcbc8ce4ef1fed187ae
SRT2003-06-13-0945.txt
Posted Jun 14, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-06-13-0945: Progress Database dbagent make the use of several helper .dll and .so binaries. When looking for shared object files for use in a dlopen statement Progress choose to look in the users PATH. No verification is performed upon the object that is located thus local non super users can make themselves root. Most binaries in /usr/dlc/bin can be exploited via this method.

tags | advisory, local, root
SHA-256 | cc47dfe490340c579a133daf438955383d7c3fc7d41008a2aff2e5564b96be2b
SRT2003-06-13-1009.txt
Posted Jun 14, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-06-13-1009: Progress Database dbagent make the use of several helper .dll and .so binaries. When looking for shared object files _dbagent looks at the argument passed to the command line option "-installdir". No verification is performed upon the object that is located thus local non super users can make themselves root.

tags | exploit, local, root
SHA-256 | 8b6fdcc0365bbcfd0d2a95fd0575bd8ddea798ae6c1a17fcde6e9e197f0d13af
cctt-0.1.7.tar.gz
Posted Jun 14, 2003
Authored by Simon Castro | Site entreelibre.com

Cctt, or "Covert Channel Tunneling Tool", is a tool that presents several exploitation techniques allowing the creation of arbitrary data transfer channels in the data streams (TCP, UDP, and HTTP) authorized by a network access control system.

tags | web, arbitrary, udp, tcp
systems | unix
SHA-256 | 6f7b41438fd9d341aa44164449ba16733e9cda53c37752b7ee30b054cfef0253
LynX-adv_myServer.txt
Posted Jun 14, 2003
Authored by LyNx

Signal handling in the myServer webserver for Windows and Linux does not perform proper trapping, allowing a remote attacker to DoS the server.

tags | advisory, remote
systems | linux, windows
SHA-256 | 39d24e0bf7039655f777a3ec241d81e2d5c2ad7d2f230207fedcc80f5217e6f8
SRT2003-06-12-0853.txt
Posted Jun 14, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-06-12-0853: ike-scan, a tool to perform security audits in the VPN arena, is vulnerable to privilege escalation if it is setuid root for other users on the system to make use of the tool.

tags | advisory, root
SHA-256 | fb2974b5f5f7c3955537f5144cea1e1d3cf3625114335c88e940fcbfb22ad899
iDEFENSE Security Advisory 2003-06-11.t
Posted Jun 14, 2003
Authored by iDefense Labs, Michael Sutton | Site idefense.com

iDEFENSE Security Advisory 06.11.03 - SMC Networks Barricade Wireless Cable/DSL Broadband Router version SMC7004VWBR crashes when a specially formatted series of packets are sent to TCP port 1723 (PPTP) on its internal interface. Following the attack, the router remains unresponsive to requests on the wireless portions of the connected LAN, thus preventing users from accessing network resources.

tags | advisory, tcp
SHA-256 | 06f5f4530631ec6de5e22a571bf7126c7ed146ccc935738f187e5617f9acca31
ethereal-0.9.13.tar.gz
Posted Jun 13, 2003
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Security related updates, system-wide color filter file, support for GNU ADNS library, and the HTTP, FTP, POP, SMTP, IMAP, and ACAP requests and responses are now shown in the protocol tree. New protocols added are distcc, EtherNet/IP, MSRPC ATSVC, and RTNET/TMDA.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 414f3a9d87beaf5e7f684cb2baba90f4e6407e05d9e592f2d2f6fa22320a900a
bazarr-unsencored-episode-3.c
Posted Jun 13, 2003
Authored by bazarr | Site geocities.com

Local exploit for E-term that escalates privileges to gid utmp via insufficient bounds checking performed on an environment variable that is copied into an internal memory buffer.

tags | exploit, local
SHA-256 | f237a0eba9a4f56b1498cd561335e4be5638015d0d619676b960dacd3044a6bd
bazarr-episode-4.c
Posted Jun 13, 2003
Authored by bazarr | Site geocities.com

Local root exploit for XaoS that makes use of a specially crafted command line -language argument to cause it to execute arbitrary code.

tags | exploit, arbitrary, local, root
SHA-256 | 69d8770f8159a752b55a03fa0726456bce230f5b5d5be8647880d72636ed92d3
redfang.tar.gz
Posted Jun 11, 2003
Authored by Ollie Whitehouse | Site atstake.com

fang is a small proof-of-concept application to find non discoverable bluetooth devices. This is done by brute forcing the last six (6) bytes of the bluetooth address of the device and doing a read_remote_name().

tags | tool, wireless
SHA-256 | 945fa08d2db2da2eb13cd4bc4bf7ca8b42c3f19daac89a8d244fa205bfcd41e5
openssh-3.6.1p2+SecurID_v1.patch
Posted Jun 11, 2003
Site omniti.com

This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.

Changes: Supports both new (5.X+) and old (<=3D 4.X) securid client API libraries.
tags | patch
systems | unix
SHA-256 | 1ac81f168242749009676261c22cae1a836b0a6b70111282cd3ba3d7b398caca
unmaskv2.tar.gz
Posted Jun 11, 2003
Authored by Serkan Akpolat | Site core.gen.tr

Unmask is a simple md5 cracking utility that will attempt to find the true IP address of a fake host using Trircd 5.0 and PTlink.

SHA-256 | b0c51a9f11f227a13b24456b72a96c5bc6d4f45d14b1af2e5b087f11b6cdd7b3
mwmxploit.c
Posted Jun 11, 2003
Authored by ThreaT

Remote format string exploit for Magic Winmail Server version 2.3. Sending a format string in the USER field during the authentication process, a remote attacker can cause the server to execute arbitrary code.

tags | exploit, remote, arbitrary
SHA-256 | 3500425cf62ca44b00af89fefa96dcebeb90a65e3253fbf1c84596b3df100aeb
htmlbar.msi
Posted Jun 11, 2003
Authored by Richard van den Berg | Site vdberg.org

HTML Source Code Explorer Bar 2.0 is a plug-in for Internet Explorer that allows you to view the form fields for any HTML form being served and easily repopulate the fields (even hidden fields) with the input of your choice and submit the data. This tool can be very useful for penetration testing input validation on CGI scripts, etc.

tags | web, cgi
SHA-256 | b83e6392af3df04eef20b40df66d69a189095649aaf2bff9ece7e6dec15bc584
Page 3 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close